Skip to content

Commit

Permalink
Merge pull request #1827 from daniel-beck/wiki-page
Browse files Browse the repository at this point in the history
Add reference to wiki page tracking affected plugins
  • Loading branch information
daniel-beck committed Oct 10, 2018
2 parents 286e2af + 2195e25 commit a5cd02b
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 0 deletions.
2 changes: 2 additions & 0 deletions content/_data/changelogs/lts.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2016,6 +2016,8 @@
title: announcement blog post
- url: /doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities
title: LTS upgrade guide
- url: https://wiki.jenkins.io/display/JENKINS/Plugins+affected+by+2018-10-10+Stapler+security+hardening
title: list of affected plugins
- type: major bug
references:
- issue: 53239
Expand Down
2 changes: 2 additions & 0 deletions content/_data/changelogs/weekly.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3438,6 +3438,8 @@
title: announcement blog post
- url: /doc/upgrade-guide/2.138/#security-hardening-to-prevent-xss-vulnerabilities
title: LTS upgrade guide
- url: https://wiki.jenkins.io/display/JENKINS/Plugins+affected+by+2018-10-10+Stapler+security+hardening
title: list of affected plugins
- type: rfe
message: Security hardening related to Stapler routing.
- type: rfe
Expand Down
1 change: 1 addition & 0 deletions content/blog/2018/10/2018-10-10-security-updates.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -28,5 +28,6 @@ This has resulted in a number of cross-site scripting (XSS) vulnerabilities, mos
For that reason, we have decided to enable this automatic escaping by default if plugins do not specify a preference.
This can result in problems with some plugins if they need their output to remain unescaped.
We expect that those plugins will adapt pretty quickly to this change, as the fix is typically straightforward.
We track known affected plugins and their status on https://wiki.jenkins.io/display/JENKINS/Plugins+affected+by+2018-10-10+Stapler+security+hardening[the Jenkins wiki].

In the mean time, users can set the https://wiki.jenkins.io/display/JENKINS/Features+controlled+by+system+properties[system property] `org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault` to `false` to disable this additional protection.
1 change: 1 addition & 0 deletions content/doc/upgrade-guide/2.138.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ A security hardening to prevent cross-site scripting vulnerabilities from being
This can in rare cases result in views having some content escaped twice (typically resulting in visible HTML entities).

We consider these effects to be a bug in plugins that either opt out of the default test suite, or use outdated toolchains.
We track known affected plugins and their status on https://wiki.jenkins.io/display/JENKINS/Plugins+affected+by+2018-10-10+Stapler+security+hardening[the Jenkins wiki].

As a temporary workaround, this hardening can be disabled by setting the system property `org.kohsuke.stapler.jelly.CustomJellyContext.escapeByDefault` to `false`.

Expand Down

0 comments on commit a5cd02b

Please sign in to comment.