An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01eDg5LTc1cjctOHJqaM4AAkK2
XSS vulnerability in Jenkins useMango Runner Plugin
Multiple form validation endpoints in useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service.
This results in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.
useMango Runner Plugin 1.5 escapes all values received from the useMango service in form validation messages.Permalink: https://github.com/advisories/GHSA-5x89-75r7-8rjh
Source: GitHub Advisory Database
Published: about 1 year ago
Updated: 4 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-5x89-75r7-8rjh, CVE-2020-2176
maven:it.infuse.jenkins:usemango-runnerVersions: < 1.5
Fixed in: 1.5