Stored XSS vulnerability in Jenkins brakeman Plugin
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Description
Published by the National Vulnerability Database
Feb 12, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jan 14, 2023
Last updated
Jan 30, 2023
brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability.
This vulnerability can be exploited by users able to control the Brakeman post-build step input data.\n\nbrakeman Plugin 0.13 escape affected values from the parsed file as they are recorded.
This fix is only applied to newly recorded data after a fixed version of the plugin is installed; historical data may still contain unsafe values.
References