[MAVEN:GHSA-Q9G4-9FX4-V533] Stored XSS vulnerability in Jenkins DotCi Plugin
Severity
High
Affected Packages
1
CVEs
1
DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the /githook/
endpoint (see also SECURITY-2867).
This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier. See the LTS upgrade guide.
Package | Affected Version |
---|---|
pkg:maven/com.groupon.jenkins-ci.plugins/DotCi | <= 2.40.00 |
- ID
- MAVEN:GHSA-Q9G4-9FX4-V533
- Severity
- high
- URL
- https://github.com/advisories/GHSA-q9g4-9fx4-v533
- Published
-
2022-09-22T00:00:28
(2 years ago) - Modified
-
2023-01-31T05:02:39
(19 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/com.groupon.jenkins-ci.plugins/DotCi | com.groupon.jenkins-ci.plugins | DotCi | <= 2.40.00 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |