A cross-site scripting vulnerability exists in Jenkins S3 Plugin 0.10.12 and older in src/main/resources/hudson/plugins/s3/S3ArtifactsProjectAction/jobMain.jelly that allows attackers able to control file names of uploaded files to define file names containing JavaScript that would be executed in another user's browser when that user performs some UI actions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2134 | A cross-site scripting vulnerability exists in Jenkins S3 Plugin 0.10.12 and older in src/main/resources/hudson/plugins/s3/S3ArtifactsProjectAction/jobMain.jelly that allows attackers able to control file names of uploaded files to define file names containing JavaScript that would be executed in another user's browser when that user performs some UI actions. |
Github GHSA |
GHSA-3892-qqv6-h2qm | Stored XSS vulnerability in Jenkins S3 Publisher Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jenkins.io/security/advisory/2018-04-16/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T04:20:43.246Z
Reserved: 2018-05-08T00:00:00Z
Link: CVE-2018-1000177
No data.
Status : Modified
Published: 2018-05-08T15:29:00.457
Modified: 2024-11-21T03:39:51.517
Link: CVE-2018-1000177
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA