Headline
GHSA-8886-8v27-85j8: Stored XSS vulnerability in Jenkins Authorize Project Plugin
Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-52552
Stored XSS vulnerability in Jenkins Authorize Project Plugin
High severity GitHub Reviewed Published Nov 13, 2024 to the GitHub Advisory Database • Updated Nov 14, 2024
Package
maven org.jenkins-ci.plugins:authorize-project (Maven)
Affected versions
< 1.8.0
Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.
References
- https://nvd.nist.gov/vuln/detail/CVE-2024-52552
- https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3010
Published to the GitHub Advisory Database
Nov 13, 2024
Last updated
Nov 14, 2024