Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2768 | Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. |
Github GHSA |
GHSA-jwx3-2hq3-682c | Jenkins Edgewall Trac Plugin vulnerable to Stored XSS |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:14:30.704Z
Reserved: 2023-10-24T16:05:00.960Z
Link: CVE-2023-46659
Updated: 2024-08-02T20:53:21.855Z
Status : Modified
Published: 2023-10-25T18:17:40.353
Modified: 2024-11-21T08:29:00.047
Link: CVE-2023-46659
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA