Jenkins.Scriptler.Plugin.Parameter.Names.Stored.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in Jenkins Scriptler Plugin.
This vulnerability is due to insufficient escaping of parameter names shown in job configuration forms. A remote, authenticated attacker with Scriptler/Configure permission could exploit this vulnerability by sending a crafted message to a vulnerable server. Successful exploitation could result in execution of script code in the security context of the target user's browser.
Affected Products
Jenkins Scriptler Plugin prior to 3.3
Impact
System Compromise: Remote attackers can execute arbitrary script code in the context of the affected application.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2224
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |