Lucene search

K
githubGitHub Advisory DatabaseGHSA-H9H3-JX58-6HQQ
HistoryApr 02, 2023 - 9:30 p.m.

Jenkins Mashup Portlets Plugin vulnerable to stored cross-site scripting

2023-04-0221:30:17
CWE-79
GitHub Advisory Database
github.com
6
jenkins
mashup portlets
xss
vulnerability
generic js portlet
authenticated attackers
overall/read permission
software

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.4%

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the “Generic JS Portlet” feature that lets a user populate a portlet using a custom JavaScript expression.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

Affected configurations

Vulners
Node
ibmconnections_portletsRange1.1.2

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.4%

Related for GHSA-H9H3-JX58-6HQQ