First published: Wed Jun 14 2023(Updated: )
Jenkins Maven Repository Server Plugin 1.10 and earlier does not escape project and build display names on the Build Artifacts As Maven Repository page, resulting in a stored cross-site scripting (XSS) vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Maven Repository Server | <=1.10 | |
maven/jenkins:repository | <=1.10 | |
<=1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35144 is categorized as a moderate severity stored cross-site scripting (XSS) vulnerability.
To remediate CVE-2023-35144, upgrade the Jenkins Maven Repository Server Plugin to version 1.11 or later.
CVE-2023-35144 affects all versions of the Jenkins Maven Repository Server Plugin up to and including version 1.10.
CVE-2023-35144 is a stored cross-site scripting (XSS) vulnerability due to improper escaping of project and build display names.
Attackers exploiting CVE-2023-35144 can execute arbitrary JavaScript in the context of a user's browser, potentially leading to data theft or account compromise.