{
  "threat_severity" : "Important",
  "public_date" : "2024-03-06T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin",
    "id" : "2268227",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2268227"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "Jenkins HTML Publisher Plugin 1.16 through 1.32 (both inclusive) does not properly sanitize input, allowing attackers with Item/Configure permission to implement cross-site scripting (XSS) attacks and to determine whether a path on the Jenkins controller file system exists.", "A flaw was found in jenkins-2-plugins. In the HTML Publisher Plugin 1.16 through 1.32, fallback for reports created in HTML Publisher Plugin 1.15 and earlier does not properly sanitize input. This can allow attackers with Item/Configure permissions to implement stored cross-site scripting (XSS) attacks and determine whether a path on the Jenkins controller file system exists, without being able to access it." ],
  "statement" : "HTML Publisher Plugin 1.32.1 removes support for reports created before HTML Publisher Plugin 1.15. Those reports are retained on the disk, but may no longer be accessible through the Jenkins UI.",
  "affected_release" : [ {
    "product_name" : "OCP-Tools-4.12-RHEL-8",
    "release_date" : "2024-06-05T00:00:00Z",
    "advisory" : "RHSA-2024:3635",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.12::el8",
    "package" : "jenkins-0:2.440.3.1716445200-3.el8"
  }, {
    "product_name" : "OCP-Tools-4.12-RHEL-8",
    "release_date" : "2024-06-05T00:00:00Z",
    "advisory" : "RHSA-2024:3635",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.12::el8",
    "package" : "jenkins-2-plugins-0:4.12.1716445211-1.el8"
  }, {
    "product_name" : "OCP-Tools-4.13-RHEL-8",
    "release_date" : "2024-06-05T00:00:00Z",
    "advisory" : "RHSA-2024:3636",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.13::el8",
    "package" : "jenkins-0:2.440.3.1716445150-3.el8"
  }, {
    "product_name" : "OCP-Tools-4.13-RHEL-8",
    "release_date" : "2024-06-05T00:00:00Z",
    "advisory" : "RHSA-2024:3636",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.13::el8",
    "package" : "jenkins-2-plugins-0:4.13.1716445207-1.el8"
  }, {
    "product_name" : "OCP-Tools-4.14-RHEL-8",
    "release_date" : "2024-06-05T00:00:00Z",
    "advisory" : "RHSA-2024:3634",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.14::el8",
    "package" : "jenkins-0:2.440.3.1716387933-3.el8"
  }, {
    "product_name" : "OCP-Tools-4.14-RHEL-8",
    "release_date" : "2024-06-05T00:00:00Z",
    "advisory" : "RHSA-2024:3634",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.14::el8",
    "package" : "jenkins-2-plugins-0:4.14.1716388016-1.el8"
  }, {
    "product_name" : "OCP-Tools-4.15-RHEL-8",
    "release_date" : "2024-07-17T00:00:00Z",
    "advisory" : "RHSA-2024:4597",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.15::el8",
    "package" : "jenkins-0:2.440.3.1718879390-3.el8"
  }, {
    "product_name" : "OCP-Tools-4.15-RHEL-8",
    "release_date" : "2024-07-17T00:00:00Z",
    "advisory" : "RHSA-2024:4597",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.15::el8",
    "package" : "jenkins-2-plugins-0:4.15.1718879538-1.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Out of support scope",
    "package_name" : "jenkins-2-plugins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-28149\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-28149\nhttps://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3301" ],
  "name" : "CVE-2024-28149",
  "csaw" : false
}