GHSA-g364-c7w5-93wh

Suggest an improvement
Source
https://github.com/advisories/GHSA-g364-c7w5-93wh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g364-c7w5-93wh/GHSA-g364-c7w5-93wh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g364-c7w5-93wh
Aliases
Published
2022-05-14T03:45:38Z
Modified
2024-02-21T05:22:17.534482Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Jenkins Delivery Pipeline Plugin Cross-site Scripting vulnerability
Details

The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter 'fullscreen' in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs. Version 1.0.8 of the plugin converts the value to a boolean (true/false) and inserts that into the page instead.

Database specific
{
    "nvd_published_at": "2018-01-26T02:29:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-12T17:17:37Z"
}
References

Affected packages

Maven / se.diabol.jenkins.pipeline:delivery-pipeline-plugin

Package

Name
se.diabol.jenkins.pipeline:delivery-pipeline-plugin
View open source insights on deps.dev
Purl
pkg:maven/se.diabol.jenkins.pipeline/delivery-pipeline-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.8

Affected versions

0.*

0.6.1
0.6.2
0.6.3
0.6.4
0.6.5
0.6.6
0.6.7
0.6.8
0.6.9
0.6.10
0.7.0
0.7.1
0.7.2
0.7.3
0.7.4
0.7.5
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
0.8.10
0.8.11
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.9
0.9.10
0.9.11
0.9.12
0.10.0
0.10.1rc6
0.10.1rc10
0.10.1
0.10.2
0.10.3

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7

Database specific

{
    "last_known_affected_version_range": "<= 1.0.7"
}