Description
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2499 | Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability. |
Github GHSA |
GHSA-g4qf-5523-7wvf | HTML injection vulnerability in Jenkins AWS CodeCommit Trigger Plugin |
References
History
Fri, 27 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-27T19:43:56.443Z
Reserved: 2023-09-05T16:39:57.394Z
Link: CVE-2023-41944
Updated: 2024-08-02T19:09:49.271Z
Status : Modified
Published: 2023-09-06T13:15:11.553
Modified: 2024-11-21T08:21:58.337
Link: CVE-2023-41944
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA