Vulnerability Description
The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Static Analysis Utilities | <= 1.91 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/101061Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2017-08-07/Vendor Advisory
- http://www.securityfocus.com/bid/101061Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2017-08-07/Vendor Advisory
FAQ
What is CVE-2017-1000102?
CVE-2017-1000102 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for ex...
How severe is CVE-2017-1000102?
CVE-2017-1000102 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000102?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Static Analysis Utilities.