Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1odjUzLXFqZzYtNXBtOc4AAkKl

XSS vulnerability in Jenkins Gatling Plugin

Gatling Plugin 1.2.7 and earlier serves Gatling reports in a manner that bypasses the Content-Security-Policy protection introduced in Jenkins 1.641 and 1.625.3. This results in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content.

Gatling Plugin 1.3.0 no longer allows viewing Gatling reports directly in Jenkins. Instead users need to download an archive containing the report.

Permalink: https://github.com/advisories/GHSA-hv53-qjg6-5pm9
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1odjUzLXFqZzYtNXBtOc4AAkKl
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: about 1 year ago


CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-hv53-qjg6-5pm9, CVE-2020-2173
References: Repository: https://github.com/jenkinsci/gatling-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:gatling
Affected Version Ranges: <= 1.2.7
Fixed in: 1.3.0