Lucene search

K
cve[email protected]CVE-2023-28678
HistoryApr 02, 2023 - 9:15 p.m.

CVE-2023-28678

2023-04-0221:15:09
CWE-79
web.nvd.nist.gov
220
jenkins
cppcheck
plugin
xss
vulnerability
security
nvd
cve-2023-28678

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.0%

Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents.

Affected configurations

NVD
Node
jenkinscppcheckRange1.26jenkins
CPENameOperatorVersion
jenkins:cppcheckjenkins cppcheckle1.26

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Cppcheck Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.26",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.0%

Related for CVE-2023-28678