logo

CVE-2022-41239 com.groupon.jenkins-ci.plugins:dotci

Package

Manager: maven
Name: com.groupon.jenkins-ci.plugins:dotci
Vulnerable Version: >=0 <=2.40.00

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.07 pctl0.91094

Details

Stored XSS vulnerability in Jenkins DotCi Plugin DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/githook/` endpoint (see also [SECURITY-2867](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2867)). This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#SECURITY-2452).

Metadata

Created: 2022-09-22T00:00:28Z
Modified: 2022-12-06T22:40:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-q9g4-9fx4-v533/GHSA-q9g4-9fx4-v533.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-q9g4-9fx4-v533
Finding: F425
Auto approve: 1