Jenkins.Pipeline.Build.Step.Plugin.Job.Name.Stored.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in Jenkins Pipeline: Build Step Plugin.
This vulnerability is due to improper input validation for job names. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Affected Products
Jenkins Pipeline: Build Step Plugin 2.18 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2023-02-15/
Version Updates
Date | Version | Detail |
---|---|---|
2023-03-31 | 0.00345 |