CVEbuzz logo
This website displays data collected from external sources, and is not responsible for any aspect of it. Read more...

Security / vulnerability advisories for Jenkins Brakeman 0.7 for Jenkins

Titles listed in dictionary

CPE for product: cpe:2.3:a:jenkins:brakeman:0.7:*:*:*:*:jenkins:*:*

Showing 1-1 of 1
Medium-low damage 5.4
Medium difficulty to exploit
(other affected products) Published: Wed Feb 12 15:15:00 2020 UTC. Last Modified: Fri Feb 14 18:48:00 2020 UTC
CPE matches: cpe:2.3:a:jenkins:brakeman:*:*:*:*:*:jenkins:*:* && versionEndIncluding=0.12

Description

Jenkins Brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability exploitable by users able to control the Brakeman post-build step input data.

Damage

Attack conditions

Damage and attack conditions obtained from CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (CVSSv3)

Type of bug(s)

References