Description
A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2135 | A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions. |
Github GHSA |
GHSA-38ch-x695-m794 | Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T01:35:40.769Z
Reserved: 2018-06-05T00:00:00.000Z
Link: CVE-2018-1000202
No data.
Status : Modified
Published: 2018-06-05T21:29:00.807
Modified: 2024-11-21T03:39:55.557
Link: CVE-2018-1000202
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA