Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2013-5573Cross-site Scripting in Jenkins

Severity
4.3MEDIUMNVD
EPSS
1.6%
top 18.10%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 31
Latest updateMay 17

Description

Cross-site scripting (XSS) vulnerability in the default markup formatter in Jenkins 1.523 allows remote attackers to inject arbitrary web script or HTML via the Description field in the user configuration.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
Jenkins allows Cross-Site Scripting (XSS) in User Configuration2022-05-17
OSV
Jenkins allows Cross-Site Scripting (XSS) in User Configuration2022-05-17

💥Exploits & PoCs

1
Exploit-DB
Jenkins 1.523 - Persistent HTML Code2013-12-18

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2014-02-142014-02-14
Red Hat
jenkins: default markup formatter permits offsite-bound forms (SECURITY-88)2013-12-16

💬Community

1
Bugzilla
CVE-2013-5573 jenkins: default markup formatter permits offsite-bound forms (SECURITY-88)2013-12-19
CVE-2013-5573 — Cross-site Scripting in Jenkins | cvebase