Jenkins GitBucket Plugin 0.8 and earlier does not sanitize Gitbucket URLs on build views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/03/06/3 | Mailing List Third Party Advisory |
| https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3249 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/03/06/3 | Mailing List Third Party Advisory |
| https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3249 | Vendor Advisory |
Configurations
History
18 Sep 2025, 14:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2024/03/06/3 - Mailing List, Third Party Advisory | |
| References | () https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3249 - Vendor Advisory | |
| CPE | cpe:2.3:a:jenkins:gitbucket:*:*:*:*:*:jenkins:*:* | |
| First Time |
Jenkins gitbucket
Jenkins |
Information
Published : 2024-03-06 17:15
Updated : 2025-09-18 14:51
NVD link : CVE-2024-28157
Mitre link : CVE-2024-28157
CVE.ORG link : CVE-2024-28157
JSON object : View
Products Affected
jenkins
- gitbucket
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
