Lucene search

K
cveJenkinsCVE-2023-40350
HistoryAug 16, 2023 - 3:15 p.m.

CVE-2023-40350

2023-08-1615:15:12
CWE-79
jenkins
web.nvd.nist.gov
219
cve-2023-40350
jenkins
docker
swarm plugin
xss
vulnerability
nvd

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

32.9%

Jenkins Docker Swarm Plugin 1.11 and earlier does not escape values returned from Docker before inserting them into the Docker Swarm Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control responses from Docker.

Affected configurations

Nvd
Node
jenkinsdocker_swarmRange1.11jenkins
VendorProductVersionCPE
jenkinsdocker_swarm*cpe:2.3:a:jenkins:docker_swarm:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Docker Swarm Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.11",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

32.9%

Related for CVE-2023-40350