QID 730618

Date Published: 2022-09-29

QID 730618: Jenkins Cross-Site Scripting (XSS) Vulnerability (Jenkins Security Advisory 2022-09-21)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI.

Affected Versions:
Jenkins weekly up to and including 2.369

Fixed Versions:
Jenkins weekly should be updated to version 2.370

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.

A stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to upgrade to latest Jenkins version
    For further details refer to Jenkins Security Advisory 2022-09-21
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2022-09-21 URL Logo www.jenkins.io/security/advisory/2022-09-21/