Stored cross-site scripting in Build Pipeline - CVE-2019-10373

 

Stored cross-site scripting in Build Pipeline - CVE-2019-10373

Published: October 4, 2019


Vulnerability identifier: #VU21544
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-10373
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Jenkins
Affected software:
Build Pipeline

Detailed vulnerability description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to the affected software does not properly escape variables in views. A remote authenticated attacker able to edit the build pipeline description can inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Note: This vulnerability is only exploitable on Jenkins releases older than 2.146 or 2.138.2 due to the security hardening implemented in those releases.


How to mitigate CVE-2019-10373

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources