[JENKINS:SECURITY-2267] Stored XSS vulnerability in `autocomplete-parameter`

Severity High
Affected Packages 2
CVEs 1

autocomplete-parameter 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

NOTE: While this looks similar to SECURITY-2729, this is an independent problem and exploitable even on views rendering parameters that otherwise attempt to prevent XSS vulnerabilities in parameter names.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2267
Severity
high
Published
2022-05-17T00:00:00
(2 years ago)
Modified
2022-05-17T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository autocomplete-parameter repository https://github.com/jenkinsci/autocomplete-parameter-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/autocomplete-parameter org.jenkins-ci.plugins autocomplete-parameter <= 1.1
Affected pkg:github/jenkinsci/autocomplete-parameter-plugin jenkinsci autocomplete-parameter-plugin <= 1.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...