[MAVEN:GHSA-GC87-QWMV-7X9X] Stored XSS vulnerability in Jenkins Artifact Repository Parameter Plugin
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
Jenkins Artifact Repository Parameter Plugin 1.0.0 and earlier does not escape parameter names and descriptions.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins Artifact Repository Parameter Plugin 1.0.1 escapes parameter names and descriptions.
Package | Affected Version |
---|---|
pkg:maven/io.jenkins.plugins/artifact-repository-parameter | <= 1.0.0 |
Package | Fixed Version |
---|---|
pkg:maven/io.jenkins.plugins/artifact-repository-parameter | = 1.0.1 |
- ID
- MAVEN:GHSA-GC87-QWMV-7X9X
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-gc87-qwmv-7x9x
- Published
-
2022-05-24T17:43:01
(2 years ago) - Modified
-
2023-12-15T10:05:56
(9 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/io.jenkins.plugins/artifact-repository-parameter | io.jenkins.plugins | artifact-repository-parameter | <= 1.0.0 | |||
Fixed | pkg:maven/io.jenkins.plugins/artifact-repository-parameter | io.jenkins.plugins | artifact-repository-parameter | = 1.0.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |