Stored Cross-site Scripting vulnerability in Jenkins Tests Selector Plugin
Moderate severity
GitHub Reviewed
Published
Mar 30, 2022
to the GitHub Advisory Database
•
Updated Oct 27, 2023
Package
Affected versions
<= 1.3.3
Patched versions
None
Description
Published by the National Vulnerability Database
Mar 29, 2022
Published to the GitHub Advisory Database
Mar 30, 2022
Reviewed
Nov 30, 2022
Last updated
Oct 27, 2023
Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
References