25 Jan 2018
CVE-2017-1000389 - CVE Vulnerability
Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability. (CVSS:0.0) (Last Update:2018-01-25)
Vulnerability Details : Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability. Publish Date : 2018-01-25 Last Update Date : 2018-01-25 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2017-1000389
- References For CVE-2017-1000389
| ||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2017-1000389There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |