CVE-2011-4344

Cross-site scripting (XSS) vulnerability in Jenkins Core in Jenkins before 1.438, and 1.409 LTS before 1.409.3 LTS, when a stand-alone container is used, allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:1.409.1:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:1.409.2:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://groups.google.com/group/jenkinsci-advisories/msg/1b94588f90f876b5?dmode=source&output=gplain - () http://groups.google.com/group/jenkinsci-advisories/msg/1b94588f90f876b5?dmode=source&output=gplain -
References () http://openwall.com/lists/oss-security/2011/11/23/5 - Patch () http://openwall.com/lists/oss-security/2011/11/23/5 - Patch
References () http://openwall.com/lists/oss-security/2011/11/23/6 - Patch () http://openwall.com/lists/oss-security/2011/11/23/6 - Patch
References () http://secunia.com/advisories/46911 - () http://secunia.com/advisories/46911 -
References () http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2011-11-08.cb - Patch, Vendor Advisory () http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2011-11-08.cb - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/50786 - () http://www.securityfocus.com/bid/50786 -
References () https://github.com/jenkinsci/winstone/commit/410ed3001d51c689cf59085b7417466caa2ded7b.patch - Patch () https://github.com/jenkinsci/winstone/commit/410ed3001d51c689cf59085b7417466caa2ded7b.patch - Patch

Information

Published : 2011-12-01 11:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4344

Mitre link : CVE-2011-4344

CVE.ORG link : CVE-2011-4344


JSON object : View

Products Affected

jenkins

  • jenkins
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')