Stored XSS vulnerability in Jenkins FitNesse Plugin
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 14, 2023
Description
Published by the National Vulnerability Database
Apr 7, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 20, 2022
Last updated
Dec 14, 2023
Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.
Jenkins FitNesse Plugin 1.32 escapes content from XML input files before rendering it on the Jenkins UI.
References