Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2499 Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability.
Github GHSA Github GHSA GHSA-g4qf-5523-7wvf HTML injection vulnerability in Jenkins AWS CodeCommit Trigger Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-09-27T19:43:56.443Z

Reserved: 2023-09-05T16:39:57.394Z

Link: CVE-2023-41944

cve-icon Vulnrichment

Updated: 2024-08-02T19:09:49.271Z

cve-icon NVD

Status : Modified

Published: 2023-09-06T13:15:11.553

Modified: 2024-11-21T08:21:58.337

Link: CVE-2023-41944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.