Description
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
Published: 2024-01-09
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Customers should upgrade to a minimum version of 1.0.6.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0424 Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
Github GHSA Github GHSA GHSA-rwf9-8fqr-p44m Qualys Jenkins Plugin for Policy Compliance Cross-site Scripting vulnerability
History

Thu, 17 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
Description Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
Title Possible XSS vulnerability in Jenkins Plugin for Qualys Policy Compliance Possible XSS vulnerability in Jenkins Plugin for Qualys Policy Compliance

Subscriptions

Qualys Policy Compliance
cve-icon MITRE

Status: PUBLISHED

Assigner: Qualys

Published:

Updated: 2025-04-17T17:59:33.171Z

Reserved: 2023-11-15T10:10:26.359Z

Link: CVE-2023-6148

cve-icon Vulnrichment

Updated: 2024-08-02T08:21:17.559Z

cve-icon NVD

Status : Modified

Published: 2024-01-09T09:15:42.530

Modified: 2025-02-13T18:16:05.887

Link: CVE-2023-6148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses