CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
33.3%
Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses.
Contrast Continuous Application Security Plugin 3.10 escapes the affected data.
Vendor | Product | Version | CPE |
---|---|---|---|
org.jenkins-ci.plugins | contrast-continuous-application-security | * | cpe:2.3:a:org.jenkins-ci.plugins:contrast-continuous-application-security:*:*:*:*:*:*:*:* |
www.openwall.com/lists/oss-security/2022/10/19/3
github.com/advisories/GHSA-hvcr-927w-qcvq
github.com/jenkinsci/contrast-continuous-application-security-plugin/commit/1babcd1e972a265527af12a9f85393d08937859c
nvd.nist.gov/vuln/detail/CVE-2022-43420
www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2836