==================================================================== CERT-Renater Note d'Information No. 2017/VULN311 _____________________________________________________________________ DATE : 24/10/2017 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Build-Publisher for Jenkins, Active Choices (uno-choice) for Jenkins, Dependency Graph Viewer for Jenkins, global-build-stats for Jenkins, Multijob for Jenkins, SCP publisher for Jenkins. ===================================================================== https://jenkins.io/security/advisory/2017-10-23/ ____________________________________________________________________ Jenkins Security Advisory 2017-10-23 This advisory announces vulnerabilities in these Jenkins plugins: Active Choices (uno-choice) Build-Publisher Dependency Graph Viewer global-build-stats Multijob SCP publisher Description Persisted Cross-Site Scripting vulnerability in Active Choices plugin SECURITY-470 / CVE pending Active Choices plugin allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the Build With Parameters page through the Active Choices Reactive Reference Parameter type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the Build With Parameters page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output. Sandboxed Groovy scripts for Active Choices Reactive Reference Parameter will no longer emit HTML that is considered unsafe, such as