Vulnerability Name: | CVE-2019-10383 (CCN-165982) | ||||||||||||
Assigned: | 2019-08-28 | ||||||||||||
Published: | 2019-08-28 | ||||||||||||
Updated: | 2022-06-13 | ||||||||||||
Summary: | A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages. | ||||||||||||
CVSS v3 Severity: | 4.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-10383 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins Source: REDHAT Type: Third Party Advisory RHSA-2019:2789 Source: REDHAT Type: Third Party Advisory RHSA-2019:3144 Source: XF Type: UNKNOWN jenkins-cve201910383-xss(165982) Source: CCN Type: Jenkins Security Advisory 2019-08-28 This advisory announces vulnerabilities in the following Jenkins deliverables Source: MISC Type: Vendor Advisory https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-10383 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||
BACK |