A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2135 | A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions. |
Github GHSA |
GHSA-38ch-x695-m794 | Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T01:35:40.769Z
Reserved: 2018-06-05T00:00:00Z
Link: CVE-2018-1000202
No data.
Status : Modified
Published: 2018-06-05T21:29:00.807
Modified: 2024-11-21T03:39:55.557
Link: CVE-2018-1000202
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA