[JENKINS:SECURITY-2262] Stored XSS vulnerability in `selected-tests-executor`

Severity High
Affected Packages 2
CVEs 1

selected-tests-executor 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2262
Severity
high
Published
2022-03-29T00:00:00
(2 years ago)
Modified
2022-03-29T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository selected-tests-executor repository https://github.com/jenkinsci/selected-tests-executor-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/selected-tests-executor org.jenkins-ci.plugins selected-tests-executor <= 1.3.3
Affected pkg:github/jenkinsci/selected-tests-executor-plugin jenkinsci selected-tests-executor-plugin <= 1.3.3
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...