Jenkins LoadComplete support Plugin Cross-site Scripting vulnerability
High severity
GitHub Reviewed
Published
May 16, 2023
to the GitHub Advisory Database
•
Updated Nov 6, 2023
Description
Published by the National Vulnerability Database
May 16, 2023
Published to the GitHub Advisory Database
May 16, 2023
Reviewed
May 17, 2023
Last updated
Nov 6, 2023
Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name in its test result page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
As of publication of this advisory, there is no fix.
References