QID 730750

Date Published: 2023-03-09

QID 730750: Jenkins Cross-Site Scripting (XSS) Vulnerability (Jenkins Security Advisory 2023-03-08)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.



Affected versions:

Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive)

Vendor has released Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 to patch the vulnerability.

QID Detection Logic (unauthenticated):
This QID checks for vulnerable version of Jenkins by sending a GET request to /login page and checking the version from the response received.

A successful exploit could be resulting in Jenkins Cross-Site Scripting (XSS) Vulnerability

  • CVSS V3 rated as Medium - 5.4 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to latest Jenkins version
    For further details refer to Jenkins Security Advisory 2023-03-08
    Vendor References

    CVEs related to QID 730750

    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2023-03-08 URL Logo www.jenkins.io/security/advisory/2023-03-08/