Jenkins Dependency Graph View 0.13 Cross Site Scripting

Risk: Medium
Local: No
Remote: Yes

CVSS Base Score: 3.5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Exploit Title: Persistent XSS - Dependency Graph View Plugin(v0.13) # Vendor Homepage: # Exploit Author: Ishaq Mohammed # Contact: # Website: # Category: webapps # Platform: Java # CVE: CVE-2019-10349 # Jenkins issue: #SECURITY-1177 1. Description: The "Display Name" field in General Options of the Configure module in Jenkins was found to be accepting arbitrary value which when loaded in the Dependency Graph View module gets execute which makes it vulnerable to a Stored/Persistent XSS. 2. Proof of Concept: Vulnerable Source http://{jenkins-hostname:port}/jobs/{projectname}/configure Steps to Reproduce: Login to Jenkins Server with valid credentials and ensure that the dependency graph plugin is installed. 1. Click on configure the Jenkins plugin. 2. Select advanced options 3. Enter the XSS payload in the "Display Name" field 4. Navigate to Dependency Graph module 5. Observe the Executed Payload 6. Payload used for the demo: <img src="a" onerror="alert('jenkinsxss')"> 3. Solution: As of publication of this advisory, there is no fix. The plugin hsa been abandoned by the maintainer Reference -- Best Regards, Ishaq Mohammed

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top