Reflected Cross-Site Scripting Vulnerability in Jenkins Build-Metrics Plugin
CVE-2019-10475
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 October 2019
Badges
Summary
A reflected cross-site scripting vulnerability exists in the Jenkins Build-Metrics Plugin, enabling attackers to embed arbitrary HTML and JavaScript into web pages generated by the plugin. This can result in unauthorized access to sensitive data or user credential theft, posing serious risks to web application integrity. Users are strongly encouraged to update to the latest version of the plugin to mitigate potential attacks.
Affected Version(s)
Jenkins build-metrics Plugin 1.3 and earlier
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
97% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved