{"id":"CVE-2019-1003013","details":"An cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export.java, blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/ExportConfig.java, blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/JSONDataWriter.java, blueocean-rest-impl/src/main/java/io/jenkins/blueocean/service/embedded/UserStatePreloader.java, blueocean-web/src/main/resources/io/jenkins/blueocean/PageStatePreloadDecorator/header.jelly that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user.","aliases":["GHSA-7fjr-5hph-c2mh"],"modified":"2026-04-09T06:22:34.321171Z","published":"2019-02-06T16:29:00.703Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2019:0326"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1204"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/blueocean-plugin","events":[{"introduced":"0"},{"last_affected":"dea18c4324deb3af4f545f714772f1ee7557cb06"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.1"}]}}],"versions":["blueocean-parent-1.0-alpha-1","blueocean-parent-1.0-alpha-2","blueocean-parent-1.0-alpha-3","blueocean-parent-1.0-alpha-4","blueocean-parent-1.0-alpha-5","blueocean-parent-1.0-alpha-6","blueocean-parent-1.0-alpha-7","blueocean-parent-1.0-alpha-8","blueocean-parent-1.0-alpha-9","blueocean-parent-1.0.0-b01","blueocean-parent-1.0.0-b02","blueocean-parent-1.0.0-b03","blueocean-parent-1.0.0-b04","blueocean-parent-1.0.0-b05","blueocean-parent-1.0.0-b06","blueocean-parent-1.0.0-b07","blueocean-parent-1.0.0-b08","blueocean-parent-1.0.0-b09","blueocean-parent-1.0.0-b10","blueocean-parent-1.0.0-b11","blueocean-parent-1.0.0-b12","blueocean-parent-1.0.0-b13","blueocean-parent-1.0.0-b14","blueocean-parent-1.0.0-b15","blueocean-parent-1.0.0-b16","blueocean-parent-1.0.0-b17","blueocean-parent-1.0.0-b18","blueocean-parent-1.0.0-b19","blueocean-parent-1.0.0-b20","blueocean-parent-1.0.0-b21","blueocean-parent-1.0.0-b22","blueocean-parent-1.0.0-b23","blueocean-parent-1.0.0-b24","blueocean-parent-1.0.0-b25","blueocean-parent-1.0.0-rc1","blueocean-parent-1.0.0-rc2","blueocean-parent-1.0.0-rc3","blueocean-parent-1.1.0-beta-1","blueocean-parent-1.1.0-beta-2","blueocean-parent-1.1.0-beta-3","blueocean-parent-1.1.0-beta-4","blueocean-parent-1.1.0-beta-5","blueocean-parent-1.1.0-beta-6","blueocean-parent-1.1.0-beta-7","blueocean-parent-1.1.0-beta-8","blueocean-parent-1.1.0-beta-9","blueocean-parent-1.10.0","blueocean-parent-1.10.1","blueocean-parent-1.2.0-beta-1","blueocean-parent-1.2.0-beta-2","blueocean-parent-1.2.0-beta-3","blueocean-parent-1.2.0-beta-4","blueocean-parent-1.2.0-beta-5","blueocean-parent-1.3.0-beta-1","blueocean-parent-1.3.0-beta-2","blueocean-parent-1.3.0-beta-3","blueocean-parent-1.3.0-beta-4","blueocean-parent-1.3.0-beta-5","blueocean-parent-1.4.0-beta-1","blueocean-parent-1.4.0-beta-2","blueocean-parent-1.4.0-beta-3","blueocean-parent-1.4.0-beta-4","blueocean-parent-1.4.0-beta-5","blueocean-parent-1.5.0-beta-1","blueocean-parent-1.5.0-beta-2","blueocean-parent-1.6.0-beta-1","blueocean-parent-1.6.0-beta-2","blueocean-parent-1.6.0-beta-3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.11"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1003013.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}