Stored Cross-Site Scripting in Jenkins Docker Swarm Plugin by CloudBees
CVE-2023-40350
5.4MEDIUM
Summary
The Jenkins Docker Swarm Plugin version 1.11 and earlier contains a stored cross-site scripting vulnerability due to improper escaping of data returned from Docker. This oversight allows malicious actors with the ability to control Docker response values to execute arbitrary JavaScript code in the context of the user’s browser, potentially compromising user accounts and exposing sensitive information through the Docker Swarm Dashboard view. To mitigate the risk, it is crucial for users to upgrade to the latest version of the plugin as recommended in the Jenkins Security Advisory.
Affected Version(s)
Jenkins Docker Swarm Plugin 0 <= 1.11
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved