Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1ocTJoLTltYzMtaDZ3Ms4AAl8v

Stored XSS vulnerability in Pipeline Maven Integration Plugin via unescaped display name

Pipeline Maven Integration Plugin 3.9.2 and earlier does not escape the upstream job’s display name shown as part of a build cause.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

Pipeline Maven Integration Plugin 3.9.3 escapes upstream job names in build causes.

Permalink: https://github.com/advisories/GHSA-hq2h-9mc3-h6w2
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ocTJoLTltYzMtaDZ3Ms4AAl8v
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 4 months ago


CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Identifiers: GHSA-hq2h-9mc3-h6w2, CVE-2020-2256
References: Repository: https://github.com/jenkinsci/pipeline-maven-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:pipeline-maven
Affected Version Ranges: <= 3.9.2
Fixed in: 3.9.3