Exploit spider-orange.png

Published on July 12th, 2019 📆 | 6546 Views ⚑


Jenkins Dependency Graph View Plugin 0.13

# Exploit Title:  Persistent XSS - Dependency Graph View Plugin(v0.13)
# Vendor Homepage: https://wiki.jenkins.io/display/JENKINS/Dependency+Graph+View+Plugin
# Exploit Author: Ishaq Mohammed
# Contact: https://twitter.com/security_prince
# Website: https://about.me/security-prince
# Category: webapps
# Platform: Java
# CVE: CVE-2019-10349
# Jenkins issue: #SECURITY-1177

1. Description:
The "Display Name" field in General Options of the Configure module in
Jenkins was found to be accepting arbitrary value which when loaded in the
Dependency Graph View module gets execute which makes it vulnerable to a
Stored/Persistent XSS.

2. Proof of Concept:
Vulnerable Source
Steps to Reproduce:
Login to Jenkins Server with valid credentials and ensure that the
dependency graph plugin is installed.
1. Click on configure the Jenkins plugin.
2. Select advanced options
3. Enter the XSS payload in the "Display Name" field
4. Navigate to Dependency Graph module
5. Observe the Executed Payload
6. Payload used for the demo:

3. Solution:
As of publication of this advisory, there is no fix.
The plugin hsa been abandoned by the maintainer



Free Download WordPress Themes
Download WordPress Themes Free
Premium WordPress Themes Download
Download WordPress Themes Free
free online course

Tagged with:

Leave a Reply ✍