Lucene search

K
githubGitHub Advisory DatabaseGHSA-6Q8R-5PM6-V2Q8
HistoryFeb 16, 2022 - 12:01 a.m.

Stored Cross-site Scripting vulnerability in Jenkins Custom Checkbox Parameter Plugin

2022-02-1600:01:27
CWE-79
GitHub Advisory Database
github.com
12
jenkins
checkbox
xss
vulnerability
configuration
permission

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

22.0%

Jenkins Custom Checkbox Parameter Plugin 1.1 and earlier does not escape parameter names of custom checkbox parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Affected configurations

Vulners
Node
io.jenkins.pluginscustom-checkbox-parameterRange<1.2
VendorProductVersionCPE
io.jenkins.pluginscustom-checkbox-parameter*cpe:2.3:a:io.jenkins.plugins:custom-checkbox-parameter:*:*:*:*:*:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

22.0%

Related for GHSA-6Q8R-5PM6-V2Q8