[MAVEN:GHSA-HW26-FW67-QXM9] Jenkins Git Parameter Plugin vulnerable to Stored cross-site scripting (XSS)

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 1

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

Package Affected Version
pkg:maven/org.jenkins-ci.tools/git-parameter <= 0.9.11
Package Fixed Version
pkg:maven/org.jenkins-ci.tools/git-parameter = 0.9.12
ID
MAVEN:GHSA-HW26-FW67-QXM9
Severity
moderate
URL
https://github.com/advisories/GHSA-hw26-fw67-qxm9
Published
2022-05-24T17:08:46
(2 years ago)
Modified
2023-12-06T14:41:09
(9 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.tools/git-parameter org.jenkins-ci.tools git-parameter <= 0.9.11
Fixed pkg:maven/org.jenkins-ci.tools/git-parameter org.jenkins-ci.tools git-parameter = 0.9.12
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...