An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS14cHZwLWg3M2MtbTlycc4AAu-W

High EPSS: 0.02451% (0.84543 Percentile) EPSS:

Jenkins vulnerable to stored cross site scripting in the I:helpIcon component

Affected Packages Affected Versions Fixed Versions
maven:org.jenkins-ci.main:jenkins-core >= 2.367, < 2.370 2.370

Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.

As of publication, the Jenkins security team is unaware of any exploitable help icon/tooltip in Jenkins core or plugins published by the Jenkins project. The vast majority of help icons use the l:help component instead of l:helpIcon. The few known instances of l:helpIcon do not have user-controllable tooltip contents.

References: