First published: Wed Mar 08 2023(Updated: )
A flaw was found in Jenkins. Affected versions of Jenkins do not escape the Jenkins version that a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins in the plugin manager. This issue results in a stored Cross-site scripting (XSS) vulnerability, exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.401.1.1686831596-3.el8 | 0:2.401.1.1686831596-3.el8 |
redhat/jenkins | <0:2.387.1.1680701869-1.el8 | 0:2.387.1.1680701869-1.el8 |
>=2.270<2.394 | ||
>=2.277.1<2.375.4 | ||
Jenkins Jenkins | >=2.270<2.394 | |
Jenkins Jenkins | >=2.277.1<2.375.4 | |
maven/org.jenkins-ci.main:jenkins-core | <2.375.4 | 2.375.4 |
maven/org.jenkins-ci.main:jenkins-core | >=2.376<2.394 | 2.394 |
redhat/Jenkins | <2.394 | 2.394 |
redhat/LTS | <2.375.4 | 2.375.4 |
redhat/LTS | <2.387.1 | 2.387.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-27898 is high, with a severity value of 8.8.
Jenkins versions 2.270 through 2.393 (inclusive) and LTS versions 2.277.1 through 2.375.3 (inclusive) are affected by CVE-2023-27898.
CVE-2023-27898 is a stored Cross-site scripting (XSS) vulnerability that allows an attacker to execute malicious scripts in the affected version of Jenkins.
Yes, the remedy for CVE-2023-27898 is to upgrade Jenkins to version 2.394 or higher.
You can find more information about CVE-2023-27898 in the following references: [https://www.cve.org/CVERecord?id=CVE-2023-27898](https://www.cve.org/CVERecord?id=CVE-2023-27898), [https://nvd.nist.gov/vuln/detail/CVE-2023-27898](https://nvd.nist.gov/vuln/detail/CVE-2023-27898), [https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3037](https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3037), [https://bugzilla.redhat.com/show_bug.cgi?id=2177629](https://bugzilla.redhat.com/show_bug.cgi?id=2177629), [https://access.redhat.com/errata/RHSA-2023:1655](https://access.redhat.com/errata/RHSA-2023:1655).