CVE-2019-1003014: Jenkins Config File Provider Plugin XSS vulnerability
4.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21231%
CWE
Published
5/13/2022
Updated
1/9/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:config-file-provider | maven | < 3.5 | 3.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how user-controlled input (config.php file names) was embedded into JavaScript code in the Jelly templates. The original code used 'onclick="return cfp_confirmDelete('${t.name}')"', which inserted the unescaped 't.name' into the JavaScript context. Attackers could inject arbitrary JavaScript via the config.php name. The fix moved the value to a 'data-confirm' attribute (HTML-encoded) and retrieved it via the DOM, avoiding direct script injection. The vulnerable functions are the JavaScript handlers in the Jelly files that improperly handled user input before the patch.