[MAVEN:GHSA-H9H3-JX58-6HQQ] Jenkins Mashup Portlets Plugin vulnerable to stored cross-site scripting
Severity
High
Affected Packages
1
CVEs
1
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.
Package | Affected Version |
---|---|
pkg:maven/javagh.jenkins/mashup-portlets-plugin | <= 1.1.2 |
- ID
- MAVEN:GHSA-H9H3-JX58-6HQQ
- Severity
- high
- URL
- https://github.com/advisories/GHSA-h9h3-jx58-6hqq
- Published
-
2023-04-02T21:30:17
(17 months ago) - Modified
-
2023-04-10T16:39:22
(17 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/javagh.jenkins/mashup-portlets-plugin | javagh.jenkins | mashup-portlets-plugin | <= 1.1.2 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |