[MAVEN:GHSA-HW26-FW67-QXM9] Jenkins Git Parameter Plugin vulnerable to Stored cross-site scripting (XSS)
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.tools/git-parameter | <= 0.9.11 |
Package | Fixed Version |
---|---|
pkg:maven/org.jenkins-ci.tools/git-parameter | = 0.9.12 |
- ID
- MAVEN:GHSA-HW26-FW67-QXM9
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-hw26-fw67-qxm9
- Published
-
2022-05-24T17:08:46
(2 years ago) - Modified
-
2023-12-06T14:41:09
(9 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.tools/git-parameter | org.jenkins-ci.tools | git-parameter | <= 0.9.11 | |||
Fixed | pkg:maven/org.jenkins-ci.tools/git-parameter | org.jenkins-ci.tools | git-parameter | = 0.9.12 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |