First published: Wed Feb 15 2023(Updated: )
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1683009955-1.el8 | 2-plugins-0:4.12.1683009955-1.el8 |
redhat/jenkins | <2-plugins-0:4.13.1684911916-1.el8 | 2-plugins-0:4.13.1684911916-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1681719745-1.el8 | 2-plugins-0:4.10.1681719745-1.el8 |
redhat/Pipeline Build Step Plugin | <2.18.1 | 2.18.1 |
Jenkins Pipeline\ | <=2.18 | |
<=2.18 | ||
maven/org.jenkins-ci.plugins:pipeline-build-step | <=2.18 | 2.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-25762 is a vulnerability in Jenkins Pipeline Build Step Plugin, which allows for stored cross-site scripting (XSS) attacks.
CVE-2023-25762 has a severity rating of 5.4 (medium).
CVE-2023-25762 affects versions up to 2.18.1 of Jenkins Pipeline Build Step Plugin.
To fix CVE-2023-25762, you should upgrade to version 2.18.1 or higher of Jenkins Pipeline Build Step Plugin.
You can find more information about CVE-2023-25762 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2023-25762), NIST National Vulnerability Database (https://nvd.nist.gov/vuln/detail/CVE-2023-25762), and Jenkins Security Advisory (https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019).