Medium severity5.4NVD Advisory· Published Oct 5, 2017· Updated May 13, 2026
CVE-2017-1000102
CVE-2017-1000102
Description
The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jvnet.hudson.plugins:analysis-coreMaven | < 1.92 | 1.92 |
Affected products
1- cpe:2.3:a:jenkins:static_analysis_utilities:*:*:*:*:*:jenkins:*:*Range: <=1.91
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.securityfocus.com/bid/101061nvdThird Party AdvisoryVDB EntryWEB
- github.com/advisories/GHSA-9c2p-99pg-c4j9ghsaADVISORY
- jenkins.io/security/advisory/2017-08-07/nvdVendor Advisory
- nvd.nist.gov/vuln/detail/CVE-2017-1000102ghsaADVISORY
- jenkins.io/security/advisory/2017-08-07ghsaWEB
News mentions
0No linked articles in our index yet.