CVE-2023-25762Cross-site Scripting in Project Jenkins Pipeline Build Step Plugin

Severity
5.4MEDIUMNVD
EPSS
65.3%
top 1.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 15

Description

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages2 packages

🔴Vulnerability Details

3
CVEList
CVE-2023-25762: Jenkins Pipeline: Build Step Plugin 22023-02-15
GHSA
Cross-site Scripting in Jenkins Pipeline: Build Step Plugin2023-02-15
OSV
Cross-site Scripting in Jenkins Pipeline: Build Step Plugin2023-02-15

📋Vendor Advisories

2
Red Hat
jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin2023-02-15
Jenkins
Jenkins Security Advisory 2023-02-152023-02-15
CVE-2023-25762 — Cross-site Scripting | cvebase