First published: Wed Apr 10 2019(Updated: )
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.165<=2.171 | 2.172 |
maven/org.jenkins-ci.main:jenkins-core | <=2.164.1 | 2.164.2 |
Jenkins | <=2.164.1 | |
Jenkins | <=2.171 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 | |
redhat openshift container platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003050 is a cross-site scripting (XSS) vulnerability in Jenkins that allows users with the ability to control job names to exploit it.
The severity of CVE-2019-1003050 is medium with a CVSS score of 5.4.
CVE-2019-1003050 affects Jenkins versions up to 2.171 and Jenkins LTS versions up to 2.164.1.
To fix CVE-2019-1003050 in Jenkins, upgrade to version 2.172 or higher for Jenkins releases, or version 2.164.2 or higher for Jenkins LTS releases.
You can find more information about CVE-2019-1003050 on the SecurityFocus, Red Hat, and Jenkins websites.