Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-02T12:23:30.482Z
Reserved: 2023-03-07T09:35:48.506Z
Link: CVE-2023-27898

No data.

Status : Modified
Published: 2023-03-10T21:15:15.403
Modified: 2024-11-21T07:53:39.583
Link: CVE-2023-27898
