Stored XSS vulnerability in Jenkins Extra Columns Plugin
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 15, 2023
Package
Affected versions
<= 1.22
Patched versions
1.23
Description
Published by the National Vulnerability Database
Mar 30, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 15, 2022
Last updated
Dec 15, 2023
Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Additionally, a view containing such a job needs to be configured with the build parameters column, or the attacker also needs View/Configure permission.
Jenkins Extra Columns Plugin 1.23 escapes parameter values in the build parameters column.
References