Jenkins.Build.With.Parameters.Plugin.Stored.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in Jenkins Build With Parameters Plugin.
his vulnerability is due to insufficient validation of the name and description properties. A remote, authenticated attacker could exploit this vulnerability by sending a crafted message to vulnerable server. Successful exploitation could result in execution of script code in the security context of target user's browser.
Affected Products
Jenkins Build With Parameters Plugin 1.5 and prior
Impact
System Compromise: Remote attackers can execute arbitrary script code in the context of the affected application.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |