Lucene search

K
cve[email protected]CVE-2023-28679
HistoryApr 02, 2023 - 9:15 p.m.

CVE-2023-28679

2023-04-0221:15:09
CWE-79
web.nvd.nist.gov
217
cve-2023-28679
jenkins
mashup portlets plugin
xss
vulnerability
nvd

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.3%

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the “Generic JS Portlet” feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

Affected configurations

NVD
Node
jenkinsmashup_portletsRange1.1.2jenkins

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Mashup Portlets Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.1.2",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.3%

Related for CVE-2023-28679