-
Bug
-
Resolution: Unresolved
-
Minor
-
None
-
Jenkins 2.138.2
After upgrading to 2.138.2 all links in columns are shown in raw HTML. Looks like setting system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false as noted here doesn't help.
Setting org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false helps.
[JENKINS-54124] Raw HTML when Stapler Security Hardening enabled
Description | Original: After upgrading to 2.138.2 all the links in columns are shown in raw HTML. As noted [here|https://jenkins.io/doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities], setting the system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false helps. | New: After upgrading to 2.138.2 all links in columns are shown in raw HTML. As noted [here|https://jenkins.io/doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities], setting the system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false helps. |
Description | Original: After upgrading to 2.138.2 all links in columns are shown in raw HTML. As noted [here|https://jenkins.io/doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities], setting the system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false helps. | New: After upgrading to 2.138.2 all links in columns are shown in raw HTML. Looks like setting system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false as noted [here|https://jenkins.io/doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities] doesn't help. |
Description | Original: After upgrading to 2.138.2 all links in columns are shown in raw HTML. Looks like setting system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false as noted [here|https://jenkins.io/doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities] doesn't help. |
New:
After upgrading to 2.138.2 all links in columns are shown in raw HTML. -Looks like setting system property org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false as noted [here|https://jenkins.io/doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities] doesn't help.- Setting org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault to false helps. |
Don't set it in the script console, set it on startup, before the UI could be cached.