Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-3415

Cross-site scripting in search box

    XMLWordPrintable

Details

    • Bug
    • Status: Closed (View Workflow)
    • Critical
    • Resolution: Fixed
    • other
    • None
    • Platform: All, OS: All

    Description

      Hudson 1.295 allows user to type cross-site scriptings(xss) on search-box.
      Example:
      http://hudson-host/search/?
      q=<script>alert('script');</script>&json={"q":+"<script>alert('oops');</script>"
      }

      Attachments

        Activity

          Code changed in hudson
          User: : kohsuke
          Path:
          trunk/hudson/main/core/src/main/resources/hudson/search/Search/search-failed.jelly
          trunk/hudson/main/test/src/main/java/org/jvnet/hudson/test/HudsonTestCase.java
          trunk/hudson/main/test/src/test/java/hudson/search/SearchTest.java
          trunk/www/changelog.html
          http://fisheye4.cenqua.com/changelog/hudson/?cs=16855
          Log:
          [FIXED JENKINS-3415] XSS vulnerability in the search box. Fixed in 1.297.

          scm_issue_link SCM/JIRA link daemon added a comment - Code changed in hudson User: : kohsuke Path: trunk/hudson/main/core/src/main/resources/hudson/search/Search/search-failed.jelly trunk/hudson/main/test/src/main/java/org/jvnet/hudson/test/HudsonTestCase.java trunk/hudson/main/test/src/test/java/hudson/search/SearchTest.java trunk/www/changelog.html http://fisheye4.cenqua.com/changelog/hudson/?cs=16855 Log: [FIXED JENKINS-3415] XSS vulnerability in the search box. Fixed in 1.297.

          People

            kohsuke Kohsuke Kawaguchi
            danielvs danielvs
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: