Miggo Logo

CVE-2023-35146: Jenkins Template Workflows Plugin vulnerable to Stored Cross-site Scripting

8

CVSS Score
3.1

Basic Information

EPSS Score
0.84451%
Published
6/14/2023
Updated
11/11/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins.plugin.templateWorkflows:template-workflowsmaven<= 41.v32d86a

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped job names in the UI. Jenkins typically uses Jelly templates for rendering, and XSS vulnerabilities in this context commonly occur when dynamic content is rendered without the h.escape() utility. The advisory explicitly states the lack of escaping for job names used as building blocks, which would be displayed in the Template Workflow configuration interface. While the exact file path is inferred from standard plugin structure patterns, the mechanism (missing output escaping in view templates) aligns with Jenkins' known vulnerability patterns for XSS.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins T*mpl*t* Work*lows Plu*in **.v******_****_** *n* **rli*r *o*s not *s**p* n*m*s o* jo*s us** *s *uil*in*s *lo*ks *or T*mpl*t* Work*low Jo*. T*is r*sults in * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xploit**l* *y *tt**k*rs **l* to *r*

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** jo* n*m*s in t** UI. J*nkins typi**lly us*s J*lly t*mpl*t*s *or r*n**rin*, *n* XSS vuln*r**iliti*s in t*is *ont*xt *ommonly o**ur w**n *yn*mi* *ont*nt is r*n**r** wit*out t** *.*s**p*() utility. T** **visory *xp