First published: Wed Aug 01 2018(Updated: )
A cross-site scripting vulnerability exists in Jenkins Shelve Project Plugin 1.5 and earlier in ShelveProjectAction/index.jelly, ShelvedProjectsAction/index.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Shelve Project | <=1.5 | |
maven/org.jenkins-ci.plugins:shelve-project-plugin | <=1.5 | 2.0 |
<=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999029 is classified as a medium severity vulnerability.
To fix CVE-2018-1999029, upgrade the Jenkins Shelve Project Plugin to version 2.0 or later.
Users of Jenkins Shelve Project Plugin version 1.5 and earlier are affected by CVE-2018-1999029.
CVE-2018-1999029 is a cross-site scripting (XSS) vulnerability.
An attacker needs Job/Configure permissions to exploit CVE-2018-1999029.