Stored XSS vulnerability in Jenkins Authorize Project Plugin
High severity
GitHub Reviewed
Published
Nov 13, 2024
to the GitHub Advisory Database
•
Updated Nov 14, 2024
Package
Affected versions
< 1.8.0
Patched versions
1.8.0
Description
Published by the National Vulnerability Database
Nov 13, 2024
Published to the GitHub Advisory Database
Nov 13, 2024
Reviewed
Nov 14, 2024
Last updated
Nov 14, 2024
Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.
References