5.4
CVSSv3

CVE-2018-1999007

Published: 23/07/2018 Updated: 13/06/2022
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

A cross-site scripting vulnerability exists in Jenkins 2.132 and previous versions, 2.121.1 and previous versions in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins jenkins

oracle communications cloud native core automated test suite 1.9.0

Vendor Advisories

A cross-site scripting vulnerability exists in Jenkins 2132 and earlier, 21211 and earlier in the Stapler web framework's org/kohsuke/stapler/Staplerjava that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 40 ...
Stapler is the web framework used by Jenkins to route HTTP requests When its debug mode is enabled, HTTP 404 error pages display diagnostic information Those error pages did not escape parts of URLs they displayed before Jenkins 2133, in rare cases resulting in a cross-site scripting vulnerability ...