Active Choices Plugin for Jenkins is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
Successful exploits will result in the execution of arbitrary attacker-supplied HTML and script code in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the page is rendered to the user. Other attacks are also possible.
Active Choices Plugin 1.5.3 and prior versions are vulnerable.
Information
Jenkins-Ci Active Choices Plugin 1.5.2
Jenkins-Ci Active Choices Plugin 1.5.1
Jenkins-Ci Active Choices Plugin 1.5.0
Exploit
An attacker can exploit this issue using a web browser.
References:
- Active Choices Plugin Homepage (Jenkins)
- Jenkins CI Homepage (Jenkins CI)
- Jenkins Security Advisory 2017-10-23 (Jenkins)