QID 730750
Date Published: 2023-03-09
QID 730750: Jenkins Cross-Site Scripting (XSS) Vulnerability (Jenkins Security Advisory 2023-03-08)
Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.
Affected versions:
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive)
Vendor has released Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 to patch the vulnerability.
QID Detection Logic (unauthenticated):
This QID checks for vulnerable version of Jenkins by sending a GET request to /login page and checking the version from the response received.
A successful exploit could be resulting in Jenkins Cross-Site Scripting (XSS) Vulnerability
Solution
Customers are advised to upgrade to latest Jenkins version
For further details refer to Jenkins Security Advisory 2023-03-08
For further details refer to Jenkins Security Advisory 2023-03-08
Vendor References
- Jenkins Security Advisory 2023-03-08 -
www.jenkins.io/security/advisory/2023-03-08/
CVEs related to QID 730750
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Jenkins Security Advisory 2023-03-08 |
|