Jenkins Simple Queue Plugin 1.4.4 and earlier does not escape the view name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Create permission.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins Project
Jenkins Project jenkins Simple Queue Plugin |
|
CPEs | cpe:2.3:a:jenkins_project:jenkins_simple_queue_plugin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Jenkins Project
Jenkins Project jenkins Simple Queue Plugin |
|
Metrics |
ssvc
|
Wed, 27 Nov 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
Wed, 27 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jenkins Simple Queue Plugin 1.4.4 and earlier does not escape the view name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Create permission. | |
References |
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-11-27T19:12:14.356Z
Reserved: 2024-11-26T08:57:17.660Z
Link: CVE-2024-54003

Updated: 2024-11-27T19:10:42.593Z

Status : Received
Published: 2024-11-27T17:15:15.333
Modified: 2024-11-27T20:15:26.133
Link: CVE-2024-54003

No data.