GHSA-5j46-5hwq-gwh7
GitHub Security Advisory
Jenkins Cross-site Scripting vulnerability
Advisory Details
`ExpandableDetailsNote` allows annotating build log content with additional information that can be revealed when interacted with.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the `caption` constructor parameter of `ExpandableDetailsNote`.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide `caption` parameter values.
As of publication, the related API is not used within Jenkins (core), and the Jenkins security team is not aware of any affected plugins.
Jenkins 2.424, LTS 2.414.2 escapes `caption` constructor parameter values.
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.