[MAVEN:GHSA-X3M6-VCP7-98MR] Stored XSS vulnerability in Jenkins REST List Parameter Plugin

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 1

Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

Jenkins REST List Parameter Plugin 1.3.1 no longer identifies a parameter using user-specified content.

Package Affected Version
pkg:maven/io.jenkins.plugins/rest-list-parameter <= 1.3.0
ID
MAVEN:GHSA-X3M6-VCP7-98MR
Severity
moderate
URL
https://github.com/advisories/GHSA-x3m6-vcp7-98mr
Published
2022-05-24T17:45:45
(2 years ago)
Modified
2023-12-20T10:19:47
(9 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/io.jenkins.plugins/rest-list-parameter io.jenkins.plugins rest-list-parameter <= 1.3.0
Fixed pkg:maven/io.jenkins.plugins/rest-list-parameter io.jenkins.plugins rest-list-parameter = 1.3.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...