Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-10475

EPSS 92.44% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-10475

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CloudBees Jenkins build-metrics Plugin 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CloudBees Jenkins(Hudson Labs)是美国CloudBees公司的一套基于Java开发的持续集成工具。该产品主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。build-metrics Plugin是使用在其中的一个构建指标生成插件。 CloudBees Jenkins build-metrics Plugin中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Jenkins projectJenkins build-metrics Plugin 1.3 and earlier -

II. Public POCs for CVE-2019-10475

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/vesche/CVE-2019-10475POC Details
2Jenkins build-metrics 1.3 is vulnerable to a reflected cross-site scripting vulnerability that allows attackers to inject arbitrary HTML and JavaScript into the web pages the plugin provides.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-10475.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-10475

登录查看更多情报信息。

Same Patch Batch · Jenkins project · 2019-10-23 · 18 CVEs total

CVE-2019-10466CloudBees Jenkins 360 FireLine Plugin 代码问题漏洞
CVE-2019-10459CloudBees Jenkins Mattermost Notification Plugin 安全漏洞
CVE-2019-10461CloudBees Jenkins Dynatrace Application Monitoring Plugin 安全漏洞
CVE-2019-10460CloudBees Jenkins Bitbucket OAuth Plugin 安全漏洞
CVE-2019-10463CloudBees Jenkins Dynatrace Application Monitoring Plugin 安全漏洞
CVE-2019-10462CloudBees Jenkins Dynatrace Application Monitoring Plugin 跨站请求伪造漏洞
CVE-2019-10465CloudBees Jenkins Deploy WebLogic Plugin 安全漏洞
CVE-2019-10464CloudBees Jenkins Deploy WebLogic Plugin 跨站请求伪造漏洞
CVE-2019-10467CloudBees Jenkins Sonar Gerrit Plugin 安全漏洞
CVE-2019-10476CloudBees Jenkins Zulip Plugin 安全漏洞
CVE-2019-10469CloudBees Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin 安全漏洞
CVE-2019-10468CloudBees Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin 跨站请求伪造漏洞
CVE-2019-10471CloudBees Jenkins Libvirt Slaves Plugin 跨站请求伪造漏洞
CVE-2019-10470CloudBees Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin 安全漏洞
CVE-2019-10473CloudBees Jenkins Libvirt Slaves Plugin 安全漏洞
CVE-2019-10472CloudBees Jenkins Libvirt Slaves Plugin 安全漏洞
CVE-2019-10474CloudBees Jenkins Global Post Script Plugin 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2019-10475

No comments yet


Leave a comment