Bug 1032400 (CVE-2013-6374)

Summary: CVE-2013-6374 Jenkins: XSS vulnerability in Build failure analyzer plugin (SECURITY-96)
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aneelica, bleanhar, ccoleman, djorm, dmcphers, jdetiber, jialiu, lmeyer, pavelp, security-response-team, tkramer
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-11-22 00:30:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1032405    

Description Kurt Seifried 2013-11-20 05:50:13 UTC
Kohsuke Kawaguchi reports:

XSS vulnerability in Build failure analyzer plugin.

If you enter javascript in the Description field for a failure cause, this is evaluated when a user loads the page for the build.
Worse, when one loads the Failure Cause Management admin page, the javascript is evaluated during the load of that page as well.

This was originally reported by Sharif Nassar

Comment 2 Vincent Danen 2013-11-21 19:03:48 UTC
This is now public:

https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-11-20

Comment 4 Pavel Polischouk 2013-11-22 00:30:54 UTC
Statement:

Not affected. This issue did not affect Jenkins as shipped with various Red Hat products, as they do not include the Jenkins Build Failure Analyzer plugin.