Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zOGNoLXg2OTUtbTc5NM4AAWoZ
Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting
A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Permalink: https://github.com/advisories/GHSA-38ch-x695-m794JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zOGNoLXg2OTUtbTc5NM4AAWoZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: 4 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-38ch-x695-m794, CVE-2018-1000202
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000202
- https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821
- https://github.com/advisories/GHSA-38ch-x695-m794
Affected Packages
maven:org.jvnet.hudson.plugins:groovy-postbuild
Versions: <= 2.3.1Fixed in: 2.4