CVE-2018-1000177 – org.jenkins-ci.plugins:s3
Package
Manager: maven
Name: org.jenkins-ci.plugins:s3
Vulnerable Version: >=0 <0.11.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00058 pctl0.18321
Details
Stored XSS vulnerability in Jenkins S3 Publisher Plugin A cross-site scripting vulnerability exists in Jenkins S3 Plugin 0.10.12 and older in src/main/resources/hudson/plugins/s3/S3ArtifactsProjectAction/jobMain.jelly that allows attackers able to control file names of uploaded files to define file names containing JavaScript that would be executed in another user's browser when that user performs some UI actions.
Metadata
Created: 2022-05-14T03:18:39Z
Modified: 2024-01-30T22:42:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-3892-qqv6-h2qm/GHSA-3892-qqv6-h2qm.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-3892-qqv6-h2qm
Finding: F425
Auto approve: 1