First published: Tue Jun 11 2019(Updated: )
A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:electricflow | <=1.1.6 | 1.1.7 |
Jenkins ElectricFlow | <=1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10335 is a stored cross site scripting vulnerability in the Jenkins ElectricFlow Plugin 1.1.5 and earlier.
The severity of CVE-2019-10335 is medium, with a CVSS score of 5.4.
CVE-2019-10335 allows users with Job/Configure permission or attackers controlling API responses from ElectricFlow to render arbitrary HTML and execute malicious scripts.
The CWE ID of CVE-2019-10335 is CWE-79, which refers to Improper Neutralization of Input During Web Page Generation (Cross-site Scripting).
To fix the vulnerability, you should upgrade to Jenkins ElectricFlow Plugin version 1.1.6 or later.