Lucene search

K
nvd[email protected]NVD:CVE-2023-28679
HistoryApr 02, 2023 - 9:15 p.m.

CVE-2023-28679

2023-04-0221:15:09
CWE-79
web.nvd.nist.gov
2
cve-2023-28679
jenkins
mashup portlets
xss
vulnerability
authenticated attackers
overall/read permission

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.9

Confidence

High

EPSS

0.001

Percentile

32.2%

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the “Generic JS Portlet” feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

Affected configurations

Nvd
Node
jenkinsmashup_portletsRange1.1.2jenkins
VendorProductVersionCPE
jenkinsmashup_portlets*cpe:2.3:a:jenkins:mashup_portlets:*:*:*:*:*:jenkins:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.9

Confidence

High

EPSS

0.001

Percentile

32.2%

Related for NVD:CVE-2023-28679