logo

CVE-2021-21699 org.biouno:uno-choice

Package

Manager: maven
Name: org.biouno:uno-choice
Vulnerable Version: >=0 <2.5.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.43994 pctl0.97457

Details

Stored XSS vulnerability in Jenkins Active Choices Plugin Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Jenkins Active Choices Plugin 2.5.7 escapes references to parameter names.

Metadata

Created: 2022-05-24T19:20:32Z
Modified: 2023-10-27T16:07:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rp4x-h577-chvq/GHSA-rp4x-h577-chvq.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-rp4x-h577-chvq
Finding: F425
Auto approve: 1