cvelist/2019/10xxx/CVE-2019-10336.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2019-03-29 13:00:58 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2019-10336",
2019-06-11 14:00:53 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins ElectricFlow Plugin",
"version": {
"version_data": [
{
"version_value": "1.1.6 and earlier"
}
]
}
}
]
}
}
]
}
2019-03-29 13:00:58 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-03-29 13:00:58 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
2019-06-11 15:00:48 +00:00
{
"refsource": "MLIST",
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/06/11/1"
2019-06-13 13:00:48 +00:00
},
{
"refsource": "BID",
"name": "108747",
"url": "http://www.securityfocus.com/bid/108747"
2019-09-19 15:01:17 +00:00
},
{
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420"
2019-03-29 13:00:58 +00:00
}
]
}
}