CVE-2018-1000202 – org.jvnet.hudson.plugins:groovy-postbuild
Package
Manager: maven
Name: org.jvnet.hudson.plugins:groovy-postbuild
Vulnerable Version: >=0 <2.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00058 pctl0.18366
Details
Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Metadata
Created: 2022-05-14T03:13:13Z
Modified: 2022-11-22T19:45:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-38ch-x695-m794/GHSA-38ch-x695-m794.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-38ch-x695-m794
Finding: F425
Auto approve: 1