Stored XSS vulnerability in Jenkins Git Parameter Plugin
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 14, 2023
Package
Affected versions
<= 0.9.12
Patched versions
0.9.13
Description
Published by the National Vulnerability Database
Sep 1, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 21, 2022
Last updated
Dec 14, 2023
Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Git Parameter Plugin 0.9.13 escapes the repository field on the 'Build with Parameters' page.
References