Loading HuntDB...

CVE-2019-10335

UNKNOWN
Published 2019-06-11T13:15:26
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2019-10335. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

Jenkins ElectricFlow Plugin is vulnerable to stored cross site scripting vulnerability

GHSA-fx9p-2qvx-pgjv

Advisory Details

The plugin adds metadata displayed on build pages during its operations. Any user content was not escaped, resulting in a cross-site scripting vulnerability allowing users with Job/Configure permission, or attackers controlling API responses received from ElectricFlow to render arbitrary HTML and JavaScript on Jenkins build pages. Build metadata is now filtered through a HTML formatter that only allows showing basic HTML, neutralizing any unsafe data. Additionally, all builds executed after the security update is applied will now properly escape content received from ElectricFlow.

Affected Packages

Maven org.jenkins-ci.plugins:electricflow
ECOSYSTEM: ≥0 <1.1.7

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: October 26, 2023

References

Published: 2019-06-11T13:15:26
Last Modified: 2024-08-04T22:17:20.471Z
Copied to clipboard!