Stored XSS vulnerability in Jenkins REST List Parameter Plugin
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 20, 2023
Package
Affected versions
<= 1.3.0
Patched versions
1.3.1
Description
Published by the National Vulnerability Database
Mar 30, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 15, 2022
Last updated
Dec 20, 2023
Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins REST List Parameter Plugin 1.3.1 no longer identifies a parameter using user-specified content.
References