GHSA-38w4-q97c-xh4x

Suggest an improvement
Source
https://github.com/advisories/GHSA-38w4-q97c-xh4x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-38w4-q97c-xh4x/GHSA-38w4-q97c-xh4x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-38w4-q97c-xh4x
Aliases
  • CVE-2022-30966
Published
2022-05-18T00:00:41Z
Modified
2024-02-16T08:24:43.680567Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Cross-site Scripting in Jenkins Random String Parameter Plugin
Details

Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Database specific
{
    "nvd_published_at": "2022-05-17T15:15:00Z",
    "cwe_ids": [
        "CWE-116",
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-06-01T21:14:21Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:random-string-parameter

Package

Name
org.jenkins-ci.plugins:random-string-parameter
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/random-string-parameter

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0

Affected versions

1.*

1.0