CVE-2023-43495: Jenkins Cross-site Scripting vulnerability
8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.69547%
CWE
Published
9/20/2023
Updated
11/12/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | >= 2.50, < 2.414.2 | 2.414.2 |
| org.jenkins-ci.main:jenkins-core | maven | >= 2.415, < 2.424 | 2.424 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability root cause is explicitly identified in the advisory as unescaped 'caption' parameter in ExpandableDetailsNote's constructor. While no actual patch code is shown, the consistent description across multiple sources indicates the constructor was modified to add HTML escaping. In Java profiling, constructor methods appear as <init>, making hudson.model.ExpandableDetailsNote.<init>(String) the exact vulnerable function signature that would appear when malicious caption values are processed.