Summary
The Ant installation component within Jenkins is affected by a stored cross-site scripting vulnerability.
As there is no patch available at this point in time, we shall update this section with more details after the vendor releases a security fix.
CVE ID
CVE-2017-17383
CVSS Score and Metrics
CVSS 2.0 METRICS: AV:N/AC:L/AU:N/C:P/I:P/A:N
CVSS 2.0 SCORE: 6.42
CVSS 3.0 METRICS: AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CVSS:3.0 SCORE 4.8
Vulnerability Type
Stored Cross Site Scripting (XSS)
Affected Vendors
Jenkins
Affected Products
Jenkins 1.60
Jenkins 1.70
Jenkins 1.80
Jenkins 1.90
Jenkins 1.100
Jenkins 1.200
Jenkins 1.300
Jenkins 1.400
Jenkins 1.500
Jenkins 1.600
Jenkins 2.0
Jenkins 2.1
Jenkins 2.2
Jenkins 2.3
Jenkins 2.4
Jenkins 2.5
Jenkins 2.6
Jenkins 2.7
Jenkins 2.73.1
Jenkins 2.8
Jenkins 2.90
Jenkins 2.91
Jenkins 2.92
Jenkins 2.93
Affected Component
Ant Installation
Solution
Not available
Attack Type
Remote
Vulnerability Impact
An attacker can inject hostile script into unsuspecting users's browser. An attacker can then leverage this issue to hijack browser sessions, redirect users to malicious websites, steal cookies and perform other actions.
Vendor Acknowledged
Yes
Vendor Reference
https://jenkins.io/security/advisory/2017-12-05/
Credit
Dhiraj Datar, Lakhshya Cyber Security Labs Pvt Ltd
Disclosure timeline
04-10-2017 - Vulnerability reported to vendor.
04-10-2017 – Vulnerability acknowledged report.
09-10-2017 – Vendor confirmation received.
04-12-2017 - Coordinated public release of advisory.
Changelog
05-12-2017 - Initial release.
05-12-2017 - CVSS scoring and metrics changed.
Originally Published in Lakhshya https://lakhshyalabs.com/research/security-advisory-jenkins-stored-cross-site-scripting-vulnerability.html