XSS vulnerability in Jenkins Markdown Formatter Plugin
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 22, 2023
Package
Affected versions
<= 0.1.0
Patched versions
0.2.0
Description
Published by the National Vulnerability Database
May 25, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 15, 2022
Last updated
Dec 22, 2023
Jenkins Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.
Jenkins Markdown Formatter Plugin 0.2.0 uses a different Markdown library that is not affected by this problem.
References