cvelist/2019/10xxx/CVE-2019-10335.json
2019-09-19 15:01:17 +00:00

72 lines
2.4 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2019-10335",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins ElectricFlow Plugin",
"version": {
"version_data": [
{
"version_value": "1.1.5 and earlier"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/06/11/1"
},
{
"refsource": "BID",
"name": "108747",
"url": "http://www.securityfocus.com/bid/108747"
},
{
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412"
}
]
}
}