Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1708 | Jenkins Template Workflows Plugin 41.v32d86a_313b_4a and earlier does not escape names of jobs used as buildings blocks for Template Workflow Job, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create jobs. |
Github GHSA |
GHSA-62v2-xwh3-5gvx | Jenkins Template Workflows Plugin vulnerable to Stored Cross-site Scripting |
Tue, 31 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-12-31T19:17:17.092Z
Reserved: 2023-06-14T08:58:33.245Z
Link: CVE-2023-35146
Updated: 2024-08-02T16:23:59.235Z
Status : Modified
Published: 2023-06-14T13:15:12.117
Modified: 2024-11-21T08:08:01.803
Link: CVE-2023-35146
OpenCVE Enrichment
No data.
EUVD
Github GHSA