logo

CVE-2022-20615 org.jenkins-ci.plugins:matrix-project

Package

Manager: maven
Name: org.jenkins-ci.plugins:matrix-project
Vulnerable Version: =1.19 || >=1.19 <1.20 || >=0 <1.18.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.43559 pctl0.97431

Details

Stored XSS vulnerability in Matrix Project Plugin Jenkins Matrix Project Plugin prior to 1.20 and 1.18.1 does not escape HTML metacharacters in node and label names, and label descriptions. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission. Matrix Project Plugin 1.20 and 1.18.1 escapes HTML metacharacters in node and label names, and label descriptions.

Metadata

Created: 2022-01-13T00:01:04Z
Modified: 2023-10-27T16:18:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-vqwg-4v6f-h6x5/GHSA-vqwg-4v6f-h6x5.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-vqwg-4v6f-h6x5
Finding: F425
Auto approve: 1