First published: Tue Jun 11 2019(Updated: )
A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:electricflow | <=1.1.6 | 1.1.7 |
Jenkins ElectricFlow | <=1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10336 is a reflected cross-site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier versions that allows attackers to inject arbitrary HTML and JavaScript into the configuration form.
Jenkins ElectricFlow Plugin versions up to and including 1.1.6 are affected by CVE-2019-10336 vulnerability.
CVE-2019-10336 vulnerability has a severity value of 6.1, which is considered medium.
An attacker with control over the output of connected ElectricFlow servers' APIs can exploit CVE-2019-10336 vulnerability by injecting arbitrary HTML and JavaScript into the configuration form of affected software.
Yes, a fix for CVE-2019-10336 vulnerability is available. Users should update to the latest version of Jenkins ElectricFlow Plugin (1.1.7 or later) to mitigate this vulnerability.