First published: Thu Sep 12 2019(Updated: )
Dashboard View Plugin did not escape the build description on the Latest Builds View. This resulted in a cross-site scripting vulnerability exploitable by attackers able to control the description of builds shown on that view. Dashboard View Plugin now applies the configured markup formatter to the build description, rendering it as it appears elsewhere in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dashboard View | <=2.11 | |
maven/org.jenkins-ci.plugins:dashboard-view | <2.12 | 2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10396 is a vulnerability in the Jenkins Dashboard View Plugin 2.11 and earlier that allows cross-site scripting (XSS) attacks.
If you are using Jenkins Dashboard View Plugin 2.11 or earlier, your system may be vulnerable to cross-site scripting attacks when users are able to change build descriptions.
CVE-2019-10396 has a severity level of medium with a CVSS score of 5.4.
To fix CVE-2019-10396, you should upgrade your Jenkins Dashboard View Plugin to version 2.12 or later.
Yes, you can find more information about CVE-2019-10396 at the following references: [Link 1](http://www.openwall.com/lists/oss-security/2019/09/12/2), [Link 2](https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489).