Описание
Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.0.1 (включая)
cpe:2.3:a:jenkins:sonargraph_integration:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 63%
0.00446
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 8
redhat
больше 2 лет назад
Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission.
CVSS3: 8
github
больше 2 лет назад
Jenkins Sonargraph Integration Plugin vulnerable to Stored Cross-site Scripting
EPSS
Процентиль: 63%
0.00446
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79