Jenkins Git Parameter Plugin vulnerable to Stored cross-site scripting (XSS)
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 6, 2023
Package
Affected versions
<= 0.9.11
Patched versions
0.9.12
Description
Published by the National Vulnerability Database
Feb 12, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jan 6, 2023
Last updated
Dec 6, 2023
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
References