Zero-Day Advisory
Fortinet Discovers Jenkins Metadata Plugin Cross-Site Scripting Vulnerability
Summary
Fortinet's FortiGuard Labs has discovered a stored Cross-Site Scripting (XSS) vulnerability in Jenkins Metadata Plugin.
Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Mac OS X and other Unix-like operating systems.
A stored XSS vulnerability has been discovered in Jenkins Metadata Plugin 1.1.0b and earlier versions. It is caused by inadequate filtering in the metadata configuration description. It allows users with permission to change metadata definitions to insert arbitrary HTML/Javascript into Jenkins pages.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:Jenkins.Metadata.Description.XSS
Released Aug 01, 2018
Users should apply the solution provided by Jenkins.
Timeline
Fortinet reported the vulnerability to Jenkins on July 31, 2018.
Jenkins confirmed the vulnerability on August 20, 2018.
Jenkins patched the vulnerability on September 25, 2018.
References
Acknowledgement
This vulnerability was discovered by Zhouyuan Yang of Fortinet's FortiGuard Labs.