First published: Thu Mar 23 2023(Updated: )
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Mashup Portlets | <=1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28679 is classified as a high severity stored cross-site scripting (XSS) vulnerability.
CVE-2023-28679 affects authenticated users with Overall/Read permission using Jenkins Mashup Portlets Plugin versions 1.1.2 and earlier.
To fix CVE-2023-28679, upgrade to Jenkins Mashup Portlets Plugin version 1.1.3 or later.
Exploiting CVE-2023-28679 could allow authenticated attackers to execute arbitrary JavaScript code in the context of the user's session.
Yes, the issue described in CVE-2023-28679 has been resolved in versions of the Jenkins Mashup Portlets Plugin released after 1.1.2.