Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8886-8v27-85j8: Stored XSS vulnerability in Jenkins Authorize Project Plugin

Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.

ghsa
#xss#vulnerability#git#java#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-52552

Stored XSS vulnerability in Jenkins Authorize Project Plugin

High severity GitHub Reviewed Published Nov 13, 2024 to the GitHub Advisory Database • Updated Nov 14, 2024

Package

maven org.jenkins-ci.plugins:authorize-project (Maven)

Affected versions

< 1.8.0

Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2024-52552
  • https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3010

Published to the GitHub Advisory Database

Nov 13, 2024

Last updated

Nov 14, 2024

ghsa: Latest News

GHSA-jh6x-7xfg-9cq2: Searching Opencast may cause a denial of service