Cross-site Scripting in Jenkins Autocomplete Parameter Plugin
High severity
GitHub Reviewed
Published
May 18, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Package
Affected versions
<= 1.1
Patched versions
None
Description
Published by the National Vulnerability Database
May 17, 2022
Published to the GitHub Advisory Database
May 18, 2022
Reviewed
Jun 1, 2022
Last updated
Jan 28, 2023
Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
While this looks similar to SECURITY-2729, this is an independent problem and exploitable even on views rendering parameters that otherwise attempt to prevent XSS vulnerabilities in parameter names.
References