First published: Wed Jun 14 2023(Updated: )
Jenkins Template Workflows Plugin 41.v32d86a_313b_4a and earlier does not escape names of jobs used as buildings blocks for Template Workflow Job, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create jobs.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Template Workflows | <=41.v32d86a_313b_4a | |
maven/org.jenkins.plugin.templateWorkflows:template-workflows | <=41.v32d86a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35146 is classified as a medium severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2023-35146, upgrade the Jenkins Template Workflows Plugin to version 41.v32d86a_314 or later.
CVE-2023-35146 affects users of Jenkins Template Workflows Plugin versions up to and including 41.v32d86a_313b_4a.
CVE-2023-35146 is a stored cross-site scripting (XSS) vulnerability that affects job names in Jenkins.
Yes, CVE-2023-35146 can be exploited by attackers who can create jobs in Jenkins.