Jenkins HTML Publisher Plugin 1.16 through 1.32 (both inclusive) does not properly sanitize input, allowing attackers with Item/Configure permission to implement cross-site scripting (XSS) attacks and to determine whether a path on the Jenkins controller file system exists.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:47:17.504Z
Reserved: 2024-03-05T19:29:05.204Z
Link: CVE-2024-28149

Updated: 2024-08-02T00:48:48.971Z

Status : Awaiting Analysis
Published: 2024-03-06T17:15:10.450
Modified: 2024-12-06T19:15:11.663
Link: CVE-2024-28149
