Lucene search

K
githubGitHub Advisory DatabaseGHSA-JWX3-2HQ3-682C
HistoryOct 25, 2023 - 6:32 p.m.

Jenkins Edgewall Trac Plugin vulnerable to Stored XSS

2023-10-2518:32:25
CWE-79
GitHub Advisory Database
github.com
7
jenkins
edgewall trac plugin
xss
vulnerability
item/configure permission
security

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

38.6%

Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchtrac

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

38.6%

Related for GHSA-JWX3-2HQ3-682C