First published: Wed Sep 25 2019(Updated: )
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.176.3 | |
Jenkins Jenkins | <=2.196 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.177<=2.196 | 2.197 |
maven/org.jenkins-ci.main:jenkins-core | <=2.176.3 | 2.176.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10402 is considered a medium severity stored XSS vulnerability.
To fix CVE-2019-10402, upgrade Jenkins to version 2.197 or version 2.176.4.
CVE-2019-10402 affects users of Jenkins versions 2.196 and earlier, including LTS versions 2.176.3 and earlier.
CVE-2019-10402 is classified as a stored Cross-Site Scripting (XSS) vulnerability.
Yes, CVE-2019-10402 can be exploited remotely by users who have permission to define the contents of the f:combobox form control.