Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2768 Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Github GHSA Github GHSA GHSA-jwx3-2hq3-682c Jenkins Edgewall Trac Plugin vulnerable to Stored XSS
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:14:30.704Z

Reserved: 2023-10-24T16:05:00.960Z

Link: CVE-2023-46659

cve-icon Vulnrichment

Updated: 2024-08-02T20:53:21.855Z

cve-icon NVD

Status : Modified

Published: 2023-10-25T18:17:40.353

Modified: 2024-11-21T08:29:00.047

Link: CVE-2023-46659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.