Stored Cross-Site Scripting in Jenkins Docker Swarm Plugin by CloudBees
CVE-2023-40350

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
16 August 2023

Summary

The Jenkins Docker Swarm Plugin version 1.11 and earlier contains a stored cross-site scripting vulnerability due to improper escaping of data returned from Docker. This oversight allows malicious actors with the ability to control Docker response values to execute arbitrary JavaScript code in the context of the user’s browser, potentially compromising user accounts and exposing sensitive information through the Docker Swarm Dashboard view. To mitigate the risk, it is crucial for users to upgrade to the latest version of the plugin as recommended in the Jenkins Security Advisory.

Affected Version(s)

Jenkins Docker Swarm Plugin 0 <= 1.11

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.