logo

CVE-2023-46650 com.coravy.hudson.plugins.github:github

Package

Manager: maven
Name: com.coravy.hudson.plugins.github:github
Vulnerable Version: >=0 <1.37.3.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.03536 pctl0.87205

Details

Stored XSS vulnerability in Jenkins GitHub Plugin Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. GitHub Plugin 1.37.3.1 escapes GitHub project URL on the build page when showing changes.

Metadata

Created: 2023-10-25T18:32:25Z
Modified: 2023-11-02T16:47:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-mv77-fj63-q5w8/GHSA-mv77-fj63-q5w8.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-mv77-fj63-q5w8
Finding: F425
Auto approve: 1