Описание
Stored Cross-site Scripting in folder-auth plugin
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.
See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
Ссылки
- https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747
- https://nvd.nist.gov/vuln/detail/CVE-2022-27200
- https://github.com/jenkinsci/folder-auth-plugin/commit/085df580c22902820ebba77b1201fabff098efc4
- https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
- http://www.openwall.com/lists/oss-security/2022/03/15/2
Пакеты
io.jenkins.plugins:folder-auth
< 1.4
1.4
Связанные уязвимости
Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.