Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0zOGNoLXg2OTUtbTc5NM4AAWoZ

Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting

A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

Permalink: https://github.com/advisories/GHSA-38ch-x695-m794
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zOGNoLXg2OTUtbTc5NM4AAWoZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


CVSS Score: 5.4
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-38ch-x695-m794, CVE-2018-1000202
References: Blast Radius: 6.0

Affected Packages

maven:org.jvnet.hudson.plugins:groovy-postbuild
Dependent packages: 0
Dependent repositories: 13
Downloads:
Affected Version Ranges: <= 2.3.1
Fixed in: 2.4
All affected versions:
All unaffected versions: