First published: Wed Aug 16 2023(Updated: )
Jenkins Docker Swarm Plugin 1.11 and earlier does not escape values returned from Docker before inserting them into the Docker Swarm Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control responses from Docker.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Docker Swarm | <=1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-40350.
The severity of CVE-2023-40350 is high with a severity value of 7.5.
The affected software for CVE-2023-40350 is Jenkins Docker Swarm Plugin version 1.11 and earlier.
The CWE ID for CVE-2023-40350 is CWE-79.
To fix CVE-2023-40350, you should upgrade to a version of Jenkins Docker Swarm Plugin that is not affected by the vulnerability.