Jenkins vulnerable to stored cross site scripting in the I:helpIcon component
High severity
GitHub Reviewed
Published
Sep 22, 2022
to the GitHub Advisory Database
•
Updated Jan 5, 2024
Package
Affected versions
>= 2.367, < 2.370
Patched versions
2.370
Description
Published by the National Vulnerability Database
Sep 21, 2022
Published to the GitHub Advisory Database
Sep 22, 2022
Reviewed
Dec 5, 2022
Last updated
Jan 5, 2024
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the
l:helpIcon
UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.As of publication, the Jenkins security team is unaware of any exploitable help icon/tooltip in Jenkins core or plugins published by the Jenkins project. The vast majority of help icons use the
l:help
component instead of l:helpIcon. The few known instances ofl:helpIcon
do not have user-controllable tooltip contents.References