Miggo Logo

CVE-2023-43495: Jenkins Cross-site Scripting vulnerability

8

CVSS Score
3.1

Basic Information

EPSS Score
0.69547%
Published
9/20/2023
Updated
11/12/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven>= 2.50, < 2.414.22.414.2
org.jenkins-ci.main:jenkins-coremaven>= 2.415, < 2.4242.424

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability root cause is explicitly identified in the advisory as unescaped 'caption' parameter in ExpandableDetailsNote's constructor. While no actual patch code is shown, the consistent description across multiple sources indicates the constructor was modified to add HTML escaping. In Java profiling, constructor methods appear as <init>, making hudson.model.ExpandableDetailsNote.<init>(String) the exact vulnerable function signature that would appear when malicious caption values are processed.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

`*xp*n***l***t*ilsNot*` *llows *nnot*tin* *uil* lo* *ont*nt wit* ***ition*l in*orm*tion t**t **n ** r*v**l** w**n int*r**t** wit*. J*nkins *.*** *n* **rli*r, LTS *.***.* *n* **rli*r *o*s not *s**p* t** v*lu* o* t** `**ption` *onstru*tor p*r*m*t*r o*

Reasoning

T** vuln*r**ility root **us* is *xpli*itly i**nti*i** in t** **visory *s un*s**p** '**ption' p*r*m*t*r in `*xp*n***l***t*ilsNot*`'s *onstru*tor. W*il* no **tu*l p*t** *o** is s*own, t** *onsist*nt **s*ription **ross multipl* sour**s in*i**t*s t** *on