cvelist/2019/10xxx/CVE-2019-10336.json
2019-09-19 15:01:17 +00:00

72 lines
2.4 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2019-10336",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins ElectricFlow Plugin",
"version": {
"version_data": [
{
"version_value": "1.1.6 and earlier"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/06/11/1"
},
{
"refsource": "BID",
"name": "108747",
"url": "http://www.securityfocus.com/bid/108747"
},
{
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420"
}
]
}
}