Описание
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.18 (включая)
cpe:2.3:a:jenkins:pipeline\:_build_step:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 98%
0.60432
Средний
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 5.4
redhat
почти 3 года назад
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
CVSS3: 5.4
github
почти 3 года назад
Cross-site Scripting in Jenkins Pipeline: Build Step Plugin
EPSS
Процентиль: 98%
0.60432
Средний
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79