Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1321 | Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. |
Github GHSA |
GHSA-h9h3-jx58-6hqq | Jenkins Mashup Portlets Plugin vulnerable to stored cross-site scripting |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 24 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-24T14:52:33.565Z
Reserved: 2023-03-20T19:59:08.757Z
Link: CVE-2023-28679
Updated: 2024-08-02T13:43:23.672Z
Status : Modified
Published: 2023-04-02T21:15:09.240
Modified: 2025-02-24T15:15:12.050
Link: CVE-2023-28679
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA