Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS13M3BqLXY5anItdjJ3Y84AAg9n

Jenkins ElectricFlow Plugin is vulnerable to reflected cross site scripting vulnerability

The configuration forms of various post-build steps contributed by CloudBees CD Plugin were vulnerable to cross-site scripting.

This allowed attackers able to control the output of connected ElectricFlow servers' APIs to inject arbitrary HTML and JavaScript into the configuration form.

CloudBees CD Plugin no longer interprets HTML/JavaScript in responses from ElectricFlow server APIs on job configuration forms.

Permalink: https://github.com/advisories/GHSA-w3pj-v9jr-v2wc
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13M3BqLXY5anItdjJ3Y84AAg9n
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago


CVSS Score: 4.7
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-w3pj-v9jr-v2wc, CVE-2019-10336
References: Repository: https://github.com/jenkinsci/electricflow-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:electricflow
Affected Version Ranges: <= 1.1.6
Fixed in: 1.1.7