Miggo Logo

CVE-2019-1003013:
Cross-site Scripting in Jenkins Blue Ocean Plugin

5.4

CVSS Score

Basic Information

EPSS Score
-
Published
5/13/2022
Updated
12/7/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.jenkins.blueocean:blueoceanmaven< 1.10.21.10.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from unescaped user-controlled HTML in JSON output. The JSONDataWriter.value() method lacked HTML escaping by default, and UserStatePreloader.getStateJson() used the vulnerable serialization without enabling the htmlEncode flag. The fix added HTML escaping in both places (via StringEscapeUtils and ExportConfig.withHtmlEncode), confirming these were the injection points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* s*riptin* vuln*r**ility *xists in J*nkins *lu* O***n Plu*ins *.**.* *n* **rli*r t**t *llows *tt**k*rs wit* p*rmission to **it * us*r's **s*ription in J*nkins to **v* *lu* O***n r*n**r *r*itr*ry *TML w**n usin* it *s t**t us*r. T*is vuln*

Reasoning

T** vuln*r**ility st*mm** *rom un*s**p** us*r-*ontroll** *TML in JSON output. T** JSON**t*Writ*r.v*lu*() m*t*o* l**k** *TML *s**pin* *y ****ult, *n* Us*rSt*t*Pr*lo***r.**tSt*t*Json() us** t** vuln*r**l* s*ri*liz*tion wit*out *n**lin* t** *tml*n*o** *