Cross-site Scripting in Jenkins Validating Email Parameter Plugin
High severity
GitHub Reviewed
Published
Jul 1, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Package
Affected versions
<= 1.10
Patched versions
None
Description
Published by the National Vulnerability Database
Jun 30, 2022
Published to the GitHub Advisory Database
Jul 1, 2022
Reviewed
Jul 12, 2022
Last updated
Jan 28, 2023
Jenkins Validating Email Parameter Plugin 1.10 and earlier does not escape the name and description of its parameter type.
Additionally, it disables the security hardening added in Jenkins 2.44 and LTS 2.32.2 as part of the SECURITY-353 / CVE-2017-2601 fix that protects the "Build With Parameters" and "Parameters" pages from vulnerabilities like this by default.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
References