First published: Wed Sep 06 2023(Updated: )
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Aws Codecommit Trigger | <=3.0.12 | |
maven/org.jenkins-ci.plugins:aws-codecommit-trigger | <=3.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41944 is a vulnerability in the Jenkins AWS CodeCommit Trigger Plugin version 3.0.12 and earlier that allows HTML injection.
The severity of CVE-2023-41944 is medium with a CVSS score of 6.1.
CVE-2023-41944 impacts Jenkins AWS CodeCommit Trigger Plugin version 3.0.12 and earlier by allowing HTML injection through a form validation URL.
To fix CVE-2023-41944, upgrade Jenkins AWS CodeCommit Trigger Plugin to version 3.0.13 or later.
You can find more information about CVE-2023-41944 in the references mentioned in the vulnerability description: [Reference 1](http://www.openwall.com/lists/oss-security/2023/09/06/9) and [Reference 2](https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3102).