•  
      request #31929 XSS via the triggered job URL of a Jenkins job
    Infos
    #31929
    Thomas Gerbet (tgerbet)
    2023-05-29 08:11
    2023-05-05 15:03
    33525
    Details
    XSS via the triggered job URL of a Jenkins job

    The logs of the triggered Jenkins job URLs are not properly escaped.

    Impact

    A malicious Git administrators can setup a malicious Jenkins hook to make a victim (also a Git administrator) execute uncontrolled code.
    CVSSv3.1 score: 4.8 (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)

    Exploitation

    1. Go to a Git repository and setup a Jenkins hook. The hook must target a malicious endpoint and respond with a 200 HTTP status code and a header Triggered set to something like javascript:alert(1)
    2. Push some content to the repository
    3. Open the logs of the hook and click on the link

    References

    CWE 79
    OWASP Cross-site Scripting
    CVE-2023-32072

    Continuous Integration
    All
    Empty
    • [ ] enhancement
    • [ ] internal improvement
    Empty
    Stage
    Yannis ROSSETTO (rossettoy)
    Closed
    2023-05-09
    Attachments
    Empty
    References
    Referenced by request #31929

    Artifact Tracker v5

    rel #31538 14.9

    Follow-ups

    User avatar
    Thomas Gerbet (tgerbet)2023-05-11 09:23

    CVE-2023-32072 has been assigned to this issue.


    • Original Submission
      Something went wrong, the follow up content couldn't be loaded
      Only formatting have been changed, you should switch to markup to see the changes
    User avatar
    Thomas Gerbet (tgerbet)2023-05-09 12:38

    gerrit #28522 integrated into Tuleap 14.8.99.60


    • Original Submission
      Something went wrong, the follow up content couldn't be loaded
      Only formatting have been changed, you should switch to markup to see the changes
    • Status changed from Under review to Closed
    • Connected artifacts
    • Close date set to 2023-05-09