GHSA-f6vx-3fq6-hxm8

Suggest an improvement
Source
https://github.com/advisories/GHSA-f6vx-3fq6-hxm8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-f6vx-3fq6-hxm8/GHSA-f6vx-3fq6-hxm8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-f6vx-3fq6-hxm8
Aliases
Published
2022-05-24T17:13:39Z
Modified
2024-02-16T08:08:17.663764Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Stored XSS vulnerability in Jenkins FitNesse Plugin
Details

Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.

Jenkins FitNesse Plugin 1.32 escapes content from XML input files before rendering it on the Jenkins UI.

Database specific
{
    "nvd_published_at": "2020-04-07T13:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-20T17:40:04Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:fitnesse

Package

Name
org.jenkins-ci.plugins:fitnesse
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/fitnesse

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.32

Affected versions

1.*

1.5
1.6
1.7
1.8
1.8.1
1.9
1.10
1.11
1.12
1.13
1.14
1.15
1.16
1.24
1.26
1.27
1.28
1.30
1.31

Database specific

{
    "last_known_affected_version_range": "<= 1.31"
}