CVE-2023-35145
https://notcve.org/view.php?id=CVE-2023-35145
Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission. • http://www.openwall.com/lists/oss-security/2023/06/14/5 https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3155 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-2201
https://notcve.org/view.php?id=CVE-2020-2201
Jenkins Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation, resulting in a stored cross-site scripting vulnerability. Jenkins Sonargraph Integration Plugin versiones 3.0.0 y anteriores, no escapa la ruta de archivo para la comprobación del formulario de campo del archivo Log, resultando en una vulnerabilidad de tipo cross-site scripting almacenado • http://www.openwall.com/lists/oss-security/2020/07/02/7 https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1775 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •