Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zeGpxLThqODkteHJ3Oc4AAWcT
Jenkins Badge Plugin cross-site scripting vulnerability
A persisted cross-site scripting vulnerability exists in Jenkins Badge Plugin 1.4 and earlier in BadgeSummaryAction.java, HtmlBadgeAction.java that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions. Badge Plugin 1.5 and newer sanitizes the provided HTML for display on the Jenkins web UI.
Permalink: https://github.com/advisories/GHSA-3xjq-8j89-xrw9JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zeGpxLThqODkteHJ3Oc4AAWcT
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: 4 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-3xjq-8j89-xrw9, CVE-2018-1000604
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000604
- https://jenkins.io/security/advisory/2018-06-25/#SECURITY-906
- https://github.com/advisories/GHSA-3xjq-8j89-xrw9
Affected Packages
maven:org.jenkins-ci.plugins:badge
Versions: <= 1.4Fixed in: 1.5