Lucene search

K
cvelistJenkinsCVELIST:CVE-2023-28679
HistoryMar 23, 2023 - 11:26 a.m.

CVE-2023-28679

2023-03-2311:26:07
jenkins
www.cve.org
cve-2023-28679
jenkins
mashup portlets plugin
cross-site scripting
authenticated attackers
overall/read permission

5.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the “Generic JS Portlet” feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Mashup Portlets Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.1.2",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

5.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

Related for CVELIST:CVE-2023-28679