Lucene search

K
githubGitHub Advisory DatabaseGHSA-WMXX-2PVR-X7J6
HistoryJun 14, 2023 - 3:30 p.m.

Jenkins Sonargraph Integration Plugin vulnerable to Stored Cross-site Scripting

2023-06-1415:30:37
CWE-79
GitHub Advisory Database
github.com
8
jenkins
sonargraph
integration
plugin
cross-site scripting
vulnerability
exploitable
attackers
permission
security

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.5%

Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not correctly escape the file path and the project name for the Log file field form validation.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Affected configurations

Vulners
Node
org.jenkins-ci.pluginssonargraph-integrationRange5.0.1
VendorProductVersionCPE
org.jenkins-ci.pluginssonargraph-integration*cpe:2.3:a:org.jenkins-ci.plugins:sonargraph-integration:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.5%