Jenkins.Pipeline.Build.Step.Plugin.Job.Name.Stored.XSS

description-logoDescription

This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in Jenkins Pipeline: Build Step Plugin.
This vulnerability is due to improper input validation for job names. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.

affected-products-logoAffected Products

Jenkins Pipeline: Build Step Plugin 2.18 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2023-02-15/

Version Updates

Date Version Detail
2023-03-31 0.00345

CVE References

CVE-2023-25762