[MAVEN:GHSA-CJ9J-V8JP-6HM9] Cross-site Scripting in Jenkins Autocomplete Parameter Plugin

Severity High
Affected Packages 1
CVEs 1

Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

While this looks similar to SECURITY-2729, this is an independent problem and exploitable even on views rendering parameters that otherwise attempt to prevent XSS vulnerabilities in parameter names.

ID
MAVEN:GHSA-CJ9J-V8JP-6HM9
Severity
high
URL
https://github.com/advisories/GHSA-cj9j-v8jp-6hm9
Published
2022-05-18T00:00:42
(2 years ago)
Modified
2023-01-28T05:02:24
(19 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/autocomplete-parameter org.jenkins-ci.plugins autocomplete-parameter <= 1.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...