Loading HuntDB...

CVE-2019-10374

UNKNOWN
Published 2019-08-07T14:20:24
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2019-10374. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

A stored cross-site scripting vulnerability in Jenkins PegDown Formatter Plugin 1.3 and earlier allows attackers able to edit descriptions and other fields rendered using the configured markup formatter to insert links with the javascript scheme into the Jenkins UI.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

Jenkins PegDown Formatter Plugin has Cross-site Scripting vulnerability

GHSA-922h-x9qv-2274

Advisory Details

PegDown Formatter Plugin uses the PegDown library to implement support for rendering Markdown formatted descriptions in Jenkins. It advertises disabling of HTML to prevent cross-site scripting (XSS) as a feature. PegDown Formatter Plugin does not prevent the use of `javascript:` scheme in URLs for links. This results in an XSS vulnerability exploitable by users able to configure entities with descriptions or similar properties that are rendered by the configured markup formatter. As of publication of this advisory, there is no fix.

Affected Packages

Maven org.jenkins-ci.plugins:pegdown-formatter
ECOSYSTEM: ≥0 ≤1.3

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: May 30, 2024

References

Published: 2019-08-07T14:20:24
Last Modified: 2024-08-04T22:17:20.368Z
Copied to clipboard!