First published: Wed Aug 12 2020(Updated: )
A flaw was found in Jenkins versions prior to 2.251 and LTS 2.235.3. The remote address of hosts starting a build via 'Trigger builds remotely' are not properly escaped leading to a potential stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the authentication token. The highest threat from this vulnerability is to data confidentiality and integrity.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.252 | 2.252 |
redhat/Jenkins-LTS | <2.235.4 | 2.235.4 |
redhat/jenkins | <0:2.235.5.1600415953-1.el7 | 0:2.235.5.1600415953-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.5.1600414805-1.el7 | 0:2.235.5.1600414805-1.el7 |
Jenkins Jenkins | <=2.235.3 | |
Jenkins Jenkins | <=2.251 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.237<=2.251 | 2.252 |
maven/org.jenkins-ci.main:jenkins-core | <=2.235.3 | 2.235.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)