Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-68869

[gerrit-trigger] Admin only XSS

XMLWordPrintable

      Description

      Gerrit Trigger does not escape the frontEndUrl.

      This results in a stored cross-site scripting (XSS) vulnerability exploitable only by attackers with Overall/Administer permission.

      We don't consider it a security vulnerability, because you need administer permission to exploit it and as an administer you can already do all the impact of a XSS.

      Recommendation

      • Escape the variable with Functions.htmlAttributeEscape() to avoid getting out of href's context
      • Make sure the variable is a valid url, eg. starting with HTTP or HTTPs

            rsandell rsandell
            kevingrdj Kevin Guerroudj
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: