CVEbuzz logo
This website displays data collected from external sources, and is not responsible for any aspect of it. Read more...

Security / vulnerability advisories for Jenkins Build With Parameters 1.4 for Jenkins

Titles listed in dictionary

CPE for product: cpe:2.3:a:jenkins:build_with_parameters:1.4:*:*:*:*:jenkins:*:*

Showing 1-2 of 2
Maximal damage 8.8
Easy to exploit
(other affected products) Published: Tue Mar 30 12:16:00 2021 UTC. Last Modified: Fri Apr 2 17:41:00 2021 UTC
CPE matches: cpe:2.3:a:jenkins:build_with_parameters:*:*:*:*:*:jenkins:*:* && versionEndIncluding=1.5

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters.

Damage

Attack conditions

Damage and attack conditions obtained from CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (CVSSv3)

Type of bug(s)

References

Medium-low damage 5.4
Medium difficulty to exploit
(other affected products) Published: Tue Mar 30 12:16:00 2021 UTC. Last Modified: Fri Apr 2 17:29:00 2021 UTC
CPE matches: cpe:2.3:a:jenkins:build_with_parameters:*:*:*:*:*:jenkins:*:* && versionEndIncluding=1.5

Description

Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

Damage

Attack conditions

Damage and attack conditions obtained from CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (CVSSv3)

Type of bug(s)

References