logo

CVE-2018-1000202 org.jvnet.hudson.plugins:groovy-postbuild

Package

Manager: maven
Name: org.jvnet.hudson.plugins:groovy-postbuild
Vulnerable Version: >=0 <2.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00058 pctl0.18366

Details

Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

Metadata

Created: 2022-05-14T03:13:13Z
Modified: 2022-11-22T19:45:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-38ch-x695-m794/GHSA-38ch-x695-m794.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-38ch-x695-m794
Finding: F425
Auto approve: 1