Описание
Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- PatchThird Party Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.19 (включая)
cpe:2.3:a:jenkins:matrix_project:*:*:*:*:*:jenkins:*:*
Конфигурация 2
cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.02892
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 5.4
redhat
около 4 лет назад
Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
CVSS3: 5.4
github
около 4 лет назад
Stored XSS vulnerability in Matrix Project Plugin
EPSS
Процентиль: 86%
0.02892
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79