CVE-2023-27905

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27905
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27905.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-27905
Aliases
Published
2023-03-10T21:15:15Z
Modified
2024-10-12T10:48:16.779367Z
Severity
  • 9.6 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.

References

Affected packages

Git / github.com/jenkins-infra/update-center2

Affected ranges

Type
GIT
Repo
https://github.com/jenkins-infra/update-center2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

update-center2-1.*

update-center2-1.10
update-center2-1.11
update-center2-1.12
update-center2-1.13
update-center2-1.14
update-center2-1.15
update-center2-1.16
update-center2-1.17
update-center2-1.18
update-center2-1.19
update-center2-1.20
update-center2-1.5
update-center2-1.6
update-center2-1.7
update-center2-1.8
update-center2-1.9

update-center2-2.*

update-center2-2.0

update-center2-3.*

update-center2-3.0
update-center2-3.0.1
update-center2-3.1
update-center2-3.10
update-center2-3.11
update-center2-3.12
update-center2-3.12.1
update-center2-3.13
update-center2-3.14
update-center2-3.2
update-center2-3.2.1
update-center2-3.3
update-center2-3.3.1
update-center2-3.4
update-center2-3.4.1
update-center2-3.4.2
update-center2-3.4.3
update-center2-3.4.4
update-center2-3.4.5
update-center2-3.4.6
update-center2-3.5
update-center2-3.6
update-center2-3.7
update-center2-3.8
update-center2-3.9