Stored Cross-Site Scripting Vulnerability in Jenkins Mashup Portlets Plugin
CVE-2023-28679

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
2 April 2023

Summary

The Jenkins Mashup Portlets Plugin allows authenticated users with Overall/Read permission to inject malicious JavaScript through the 'Generic JS Portlet' feature. This results in a stored cross-site scripting vulnerability, enabling attackers to execute arbitrary scripts in the context of other users, which could lead to data theft or unauthorized actions in the application.

Affected Version(s)

Jenkins Mashup Portlets Plugin 0 <= 1.1.2

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.