CVE-2017-1000386Cross-site Scripting in Jenkins Active Choices

Severity
5.4MEDIUMNVD
EPSS
0.0%
top 87.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 26
Latest updateMay 14

Description

Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up t

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages1 packages

🔴Vulnerability Details

3
GHSA
Cross-site Scripting in Jenkins Active Choices plugin2022-05-14
OSV
Cross-site Scripting in Jenkins Active Choices plugin2022-05-14
CVEList
CVE-2017-1000386: Jenkins Active Choices plugin version 12018-01-26

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2017-10-232017-10-23
CVE-2017-1000386 — Cross-site Scripting in Jenkins | cvebase