QID 730618
Date Published: 2022-09-29
QID 730618: Jenkins Cross-Site Scripting (XSS) Vulnerability (Jenkins Security Advisory 2022-09-21)
Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI.
Affected Versions:
Jenkins weekly up to and including 2.369
Fixed Versions:
Jenkins weekly should be updated to version 2.370
QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.
A stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.
For further details refer to Jenkins Security Advisory 2022-09-21
- Jenkins Security Advisory 2022-09-21 -
www.jenkins.io/security/advisory/2022-09-21/
CVEs related to QID 730618
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Jenkins Security Advisory 2022-09-21 |
|