Jenkins, a popular open-source automation server, is used by many developers to automate parts of the software development process. One of the many plugins available to Jenkins users is the Fortify Plugin, which helps integrate Fortify on Demand (FoD), a leading application security solution, into the development workflow. However, it has come to light that Jenkins Fortify Plugin version 22.1.38 and earlier suffers from an HTML injection vulnerability due to a lack of error message sanitization in a form validation method. In this post, we'll delve into the details of CVE-2023-4303, explore the exploit, and provide steps to remediate the issue.

The Vulnerability (CVE-2023-4303)

The vulnerability arises from the Fortify Plugin not properly escaping the error message in a form validation method. As a result, HTML code can be executed in the context of the Jenkins web application, leading to an HTML injection attack. This type of attack can enable attackers to launch phishing attacks, steal user credentials, or perform other malicious actions by manipulating the HTML content of the affected web application.

Exploit Details

An attacker with the ability to control the error message in the form validation method could create a carefully crafted error message containing HTML and JavaScript code. When this error message is rendered without proper sanitization by the Fortify Plugin, the attacker's code would be executed within the user's browser, potentially leading to a variety of security issues.

For example, an attacker could use the following code snippet to inject malicious content into the form error message:

<script>alert('XSS attack!');</script>

When this error message is displayed in Jenkins without proper escaping, the JavaScript code will be executed, causing an alert with the text "XSS attack!" to be displayed to the user.

Original References

The issue was first reported to the Jenkins project, and a detailed description of the vulnerability can be found in the Jenkins security advisory ( The CVE ID assigned to this vulnerability is CVE-2023-4303.

Mitigation Steps

The Jenkins project has released an updated version of the Fortify Plugin (version 22.1.39) that addresses the HTML injection vulnerability. Users of the Fortify Plugin are urged to update to the latest version as soon as possible to mitigate the risk. To update the plugin, follow these steps:

Select the "Updates" tab and search for the "Fortify Plugin."

4. If an update is available, check the box next to the plugin and click "Download now and install after restart."

Restart your Jenkins instance to complete the update process.

Additionally, it is crucial to ensure that your Jenkins instance implements proper access controls, as this vulnerability can only be exploited by users with the ability to control the error message in the form validation method. By restricting access to trusted users, you can further minimize the risk of this vulnerability being exploited.


The Jenkins Fortify Plugin HTML injection vulnerability (CVE-2023-4303) is a reminder that even widely used automation tools and plugins can be susceptible to security flaws. By updating to the latest version of the plugin and implementing proper access controls, you can help protect your Jenkins instance and maintain the confidentiality, integrity, and availability of your software development process.


Published on: 08/21/2023 23:15:00 UTC
Last modified on: 08/24/2023 21:35:00 UTC