Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1meDlwLTJxdngtcGdqds4AAg98

Jenkins ElectricFlow Plugin is vulnerable to stored cross site scripting vulnerability

The plugin adds metadata displayed on build pages during its operations.

Any user content was not escaped, resulting in a cross-site scripting vulnerability allowing users with Job/Configure permission, or attackers controlling API responses received from ElectricFlow to render arbitrary HTML and JavaScript on Jenkins build pages.

Build metadata is now filtered through a HTML formatter that only allows showing basic HTML, neutralizing any unsafe data. Additionally, all builds executed after the security update is applied will now properly escape content received from ElectricFlow.

Permalink: https://github.com/advisories/GHSA-fx9p-2qvx-pgjv
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1meDlwLTJxdngtcGdqds4AAg98
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago


CVSS Score: 5.4
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-fx9p-2qvx-pgjv, CVE-2019-10335
References: Repository: https://github.com/jenkinsci/electricflow-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:electricflow
Affected Version Ranges: <= 1.1.6
Fixed in: 1.1.7