GHSA-5x89-75r7-8rjh

Suggest an improvement
Source
https://github.com/advisories/GHSA-5x89-75r7-8rjh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5x89-75r7-8rjh/GHSA-5x89-75r7-8rjh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5x89-75r7-8rjh
Aliases
Published
2022-05-24T17:13:39Z
Modified
2023-11-08T04:02:54.957174Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
XSS vulnerability in Jenkins useMango Runner Plugin
Details

Multiple form validation endpoints in useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service.

This results in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.

useMango Runner Plugin 1.5 escapes all values received from the useMango service in form validation messages.

Database specific
{
    "nvd_published_at": "2020-04-07T13:15:00Z",
    "github_reviewed_at": "2022-12-20T19:24:27Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Maven / it.infuse.jenkins:usemango-runner

Package

Name
it.infuse.jenkins:usemango-runner
View open source insights on deps.dev
Purl
pkg:maven/it.infuse.jenkins/usemango-runner

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5

Affected versions

Other

y

1.*

1.0
1.1
1.2
1.3
1.4