Bug 1671324 (CVE-2019-1003014)

Summary: CVE-2019-1003014 jenkins-plugin-config-file-provider: Stored XSS vulnerability in Config File Provider Plugin (SECURITY-1253)
Product: [Other] Security Response Reporter: Paul Harvey <pharvey>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abenaiss, ahardin, aos-bugs, bleanhar, bmontgom, ccoleman, dedgar, eparis, jburrell, jgoulding, jokerman, mchappel, mmccomas, nstielau, obulatov, pbhattac, sponnaga, wzheng
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: jenkins-plugin-config-file-provider 3.5 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-27 03:22:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1671469, 1671470    
Bug Blocks: 1670285    

Description Paul Harvey 2019-01-31 12:04:15 UTC
Config File Provider Plugin up to and including version 3.4.1 improperly handled script names in its JavaScript-based UI, resulting in a stored cross-site scripting (XSS) vulnerability.

Upstream patches:


Comment 1 Paul Harvey 2019-01-31 12:04:18 UTC
External References:


Comment 2 Paul Harvey 2019-02-04 06:29:39 UTC
openshift-enterprise 3.6-3.11 inclusive: affected

Once openshift3/jenkins-1-rhel7, openshift3/jenkins-2-rhel7, openshift3/jenkins-slave-base-rhel7 container images have been released with these fixes, users of all versions of openshift-enterprise-3.2+ are encouraged to update these container images in their environment.