[MAVEN:GHSA-RJCH-J5X9-FGPH] Stored XSS vulnerability in Jenkins Active Choices Plugin

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 1

Jenkins Active Choices Plugin 2.4 and earlier does not escape List and Map return values of sandboxed scripts for Reactive Reference Parameters.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

This issue is caused by an incomplete fix for SECURITY-470.

Active Choices Plugin 2.5 escapes all legal return values of sandboxed scripts.

Package Affected Version
pkg:maven/org.biouno/uno-choice < 2.5
Package Fixed Version
pkg:maven/org.biouno/uno-choice = 2.5
ID
MAVEN:GHSA-RJCH-J5X9-FGPH
Severity
moderate
URL
https://github.com/advisories/GHSA-rjch-j5x9-fgph
Published
2022-05-24T17:30:18
(2 years ago)
Modified
2023-12-22T11:06:35
(9 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.biouno/uno-choice org.biouno uno-choice < 2.5
Fixed pkg:maven/org.biouno/uno-choice org.biouno uno-choice = 2.5
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...