2 results (0.006 seconds)

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins global-build-stats Plugin 1.5 and earlier does not escape multiple fields in the chart configuration on the 'Global Build Stats' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. El Plugin global-build-stats de Jenkins versiones 1.5 y anteriores, no escapa de múltiples campos en la configuración del gráfico en la página "Global Build Stats", resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenada explotable por atacantes con permiso Overall/Administer • http://www.openwall.com/lists/oss-security/2022/03/15/2 https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1886 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability. Algunas URL proporcionadas por el plugin Jenkins global-build-stats en su versión 1.4 y anteriores devolvía una respuesta JSON que contenía parámetros de peticiones. Estas respuestas tenían el Content Type: text/html, por lo que podrían interpretarse como HTML por los clientes, lo que resulta en una potencial vulnerabilidad de Cross-Site Scripting (XSS). • https://jenkins.io/security/advisory/2017-10-23 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •