[MAVEN:GHSA-Q9G4-9FX4-V533] Stored XSS vulnerability in Jenkins DotCi Plugin

Severity High
Affected Packages 1
CVEs 1

DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the /githook/ endpoint (see also SECURITY-2867).

This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier. See the LTS upgrade guide.

Package Affected Version
pkg:maven/com.groupon.jenkins-ci.plugins/DotCi <= 2.40.00
ID
MAVEN:GHSA-Q9G4-9FX4-V533
Severity
high
URL
https://github.com/advisories/GHSA-q9g4-9fx4-v533
Published
2022-09-22T00:00:28
(2 years ago)
Modified
2023-01-31T05:02:39
(19 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/com.groupon.jenkins-ci.plugins/DotCi com.groupon.jenkins-ci.plugins DotCi <= 2.40.00
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...