Lucene search

K
githubGitHub Advisory DatabaseGHSA-5WPG-QCMJ-48WH
HistoryMay 16, 2023 - 6:30 p.m.

TestComplete support Plugin vulnerable to stored Cross-site Scripting

2023-05-1618:30:16
CWE-79
GitHub Advisory Database
github.com
7
testcomplete
plugin
xss
vulnerability
stored
cross-site scripting
test result page
attackers
item
configure
permission
publication
advisory
software

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.7%

TestComplete support Plugin 2.8.1 and earlier does not escape the TestComplete project name in its test result page.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchtestcomplete

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.7%

Related for GHSA-5WPG-QCMJ-48WH