Stored Cross-Site Scripting in Jenkins Pipeline Job Plugin
CVE-2023-32977
5.4MEDIUM
Summary
The Jenkins Pipeline Job Plugin is susceptible to a stored cross-site scripting vulnerability due to improper escaping of the display name for builds. This flaw could allow malicious users, capable of setting build display names, to execute arbitrary JavaScript code in the context of other users' browsers. As a result, sensitive data could be compromised, and user sessions hijacked without the need for direct user interaction. It is crucial to update to the patched version to mitigate this security risk.
Affected Version(s)
Jenkins Pipeline: Job Plugin 1295.v395eb_7400005
Jenkins Pipeline: Job Plugin 1295.v395eb_7400005
Jenkins Pipeline: Job Plugin 1289.1291.vb_7c188e7e7df < 1289.*
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved