Stored Cross-Site Scripting Vulnerability in Jenkins Mashup Portlets Plugin
CVE-2023-28679
5.4MEDIUM
Summary
The Jenkins Mashup Portlets Plugin allows authenticated users with Overall/Read permission to inject malicious JavaScript through the 'Generic JS Portlet' feature. This results in a stored cross-site scripting vulnerability, enabling attackers to execute arbitrary scripts in the context of other users, which could lead to data theft or unauthorized actions in the application.
Affected Version(s)
Jenkins Mashup Portlets Plugin 0 <= 1.1.2
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved