CVE-2023-46650 – com.coravy.hudson.plugins.github:github
Package
Manager: maven
Name: com.coravy.hudson.plugins.github:github
Vulnerable Version: >=0 <1.37.3.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03536 pctl0.87205
Details
Stored XSS vulnerability in Jenkins GitHub Plugin Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. GitHub Plugin 1.37.3.1 escapes GitHub project URL on the build page when showing changes.
Metadata
Created: 2023-10-25T18:32:25Z
Modified: 2023-11-02T16:47:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-mv77-fj63-q5w8/GHSA-mv77-fj63-q5w8.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-mv77-fj63-q5w8
Finding: F425
Auto approve: 1