CVE-2024-28149: Jenkins HTML Publisher Plugin does not properly sanitize input
8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33812%
CWE
Published
3/6/2024
Updated
12/6/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:htmlpublisher | maven | >= 1.16, < 1.32.1 | 1.32.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) The getLegacySanitizedName function's weak sanitization allowed XSS via report names and path traversal. 2) The dir methods in HTMLAction/HTMLBuildAction checked legacy paths (using getLegacySanitizedName), enabling filesystem probing. The patch (8bf2e22) removed these legacy checks and the getLegacySanitizedName function, confirming their role in the vulnerability. The test cases (Security3301Test) demonstrate how malicious report names could bypass sanitization, further validating these functions as the root cause.