An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4797 An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file.
Github GHSA Github GHSA GHSA-pmc5-74w3-78mw Jenkins Config File Provider Plugin XSS vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-05T03:00:19.351Z

Reserved: 2019-02-06T00:00:00

Link: CVE-2019-1003014

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-06T16:29:00.733

Modified: 2024-11-21T04:17:44.530

Link: CVE-2019-1003014

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-01-28T00:00:00Z

Links: CVE-2019-1003014 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses