CVE-2023-43495 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=2.50 <2.414.2 || >=2.415 <2.424
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00598 pctl0.68443
Details
Jenkins Cross-site Scripting vulnerability `ExpandableDetailsNote` allows annotating build log content with additional information that can be revealed when interacted with. Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the `caption` constructor parameter of `ExpandableDetailsNote`. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide `caption` parameter values. As of publication, the related API is not used within Jenkins (core), and the Jenkins security team is not aware of any affected plugins. Jenkins 2.424, LTS 2.414.2 escapes `caption` constructor parameter values.
Metadata
Created: 2023-09-20T18:30:21Z
Modified: 2023-09-21T17:21:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-5j46-5hwq-gwh7/GHSA-5j46-5hwq-gwh7.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-5j46-5hwq-gwh7
Finding: F425
Auto approve: 1