logo

CVE-2022-30966 org.jenkins-ci.plugins:random-string-parameter

Package

Manager: maven
Name: org.jenkins-ci.plugins:random-string-parameter
Vulnerable Version: >=0 <=1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.03717 pctl0.87514

Details

Cross-site Scripting in Jenkins Random String Parameter Plugin Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Metadata

Created: 2022-05-18T00:00:41Z
Modified: 2022-06-01T21:14:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-38w4-q97c-xh4x/GHSA-38w4-q97c-xh4x.json
CWE IDs: ["CWE-116", "CWE-79"]
Alternative ID: GHSA-38w4-q97c-xh4x
Finding: F425
Auto approve: 1