Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01eDg5LTc1cjctOHJqaM4AAkK2

XSS vulnerability in Jenkins useMango Runner Plugin

Multiple form validation endpoints in useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service.

This results in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.

useMango Runner Plugin 1.5 escapes all values received from the useMango service in form validation messages.

Permalink: https://github.com/advisories/GHSA-5x89-75r7-8rjh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01eDg5LTc1cjctOHJqaM4AAkK2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: about 1 year ago


CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-5x89-75r7-8rjh, CVE-2020-2176
References:

Affected Packages

maven:it.infuse.jenkins:usemango-runner
Affected Version Ranges: < 1.5
Fixed in: 1.5