CVE-2018-1000202

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1000202
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000202.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-1000202
Aliases
Published
2018-06-05T21:29:00Z
Modified
2024-09-03T02:01:22.657323Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

References

Affected packages

Git / github.com/jenkinsci/groovy-postbuild-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/groovy-postbuild-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

groovy-postbuild-1.*

groovy-postbuild-1.10
groovy-postbuild-1.5
groovy-postbuild-1.6
groovy-postbuild-1.7
groovy-postbuild-1.8
groovy-postbuild-1.9

groovy-postbuild-2.*

groovy-postbuild-2.0
groovy-postbuild-2.1
groovy-postbuild-2.2
groovy-postbuild-2.2.1
groovy-postbuild-2.2.2
groovy-postbuild-2.3
groovy-postbuild-2.3.1