Lucene search

K
cve[email protected]CVE-2023-30520
HistoryApr 12, 2023 - 6:15 p.m.

CVE-2023-30520

2023-04-1218:15:09
CWE-79
web.nvd.nist.gov
17
cve-2023-30520
jenkins
quay.io trigger plugin
xss
vulnerability
nvd

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

49.2%

Jenkins Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes for repository homepage URLs submitted via Quay.io trigger webhooks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Quay.io trigger webhook payloads.

Affected configurations

NVD
Node
jenkinsquay.io_triggerRange0.1jenkins

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Quay.io trigger Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "0.1",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

49.2%

Related for CVE-2023-30520