cvelist/2017/1000xxx/CVE-2017-1000102.json

66 lines
1.9 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"DATE_ASSIGNED" : "2017-08-22T17:29:33.317430",
"ID" : "CVE-2017-1000102",
"REQUESTER" : "ml@beckweb.net",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Jenkins Static Analysis Utilities Plugin",
"version" : {
"version_data" : [
{
"version_value" : "1.91 and earlier"
}
]
}
}
]
},
"vendor_name" : "Jenkins Static Analysis Utilities Plugin"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "XSS"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://jenkins.io/security/advisory/2017-08-07/"
},
{
"url" : "http://www.securityfocus.com/bid/101061"
}
]
}
}