Miggo Logo

CVE-2019-10402: Improper Neutralization of Input During Web Page Generation in Jenkins

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.66683%
Published
5/24/2022
Updated
12/19/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven<= 2.176.32.176.4
org.jenkins-ci.main:jenkins-coremaven>= 2.177, <= 2.1962.197

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper HTML neutralization in the f:combobox control. The commit diff shows the critical fix changed 'innerHTML' to 'innerText' in combobox.js line 249, directly addressing HTML interpretation of item labels. The added test case (ComboBoxSEC1525Test) verifies that HTML payloads in combobox items are no longer rendered as DOM elements, confirming this was the vulnerable code path.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In J*nkins *.*** *n* **rli*r, LTS *.***.* *n* **rli*r, t** *:*om*o*ox *orm *ontrol int*rpr*t** its it*m l***ls *s *TML, r*sultin* in * stor** XSS vuln*r**ility *xploit**l* *y us*rs wit* p*rmission to ***in* its *ont*nts.

Reasoning

T** vuln*r**ility st*mm** *rom improp*r *TML n*utr*liz*tion in t** `*:*om*o*ox` *ontrol. T** *ommit *i** s*ows t** *riti**l *ix ***n*** 'inn*r*TML' to 'inn*rT*xt' in `*om*o*ox.js` lin* ***, *ir**tly ***r*ssin* *TML int*rpr*t*tion o* it*m l***ls. T**