First published: Mon Aug 21 2023(Updated: )
Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method, resulting in an HTML injection vulnerability.
Credit: security@opentext.com security@opentext.com security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Fortify | <22.2.39 | |
maven/org.jenkins-ci.plugins:fortify | <=22.1.38 | 22.2.39 |
<22.2.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4303 is medium with a CVSS score of 6.1.
The vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier is an HTML injection vulnerability.
Jenkins Fortify Plugin 22.2.39 fixes the vulnerability by removing HTML tags from the error message.
You can find more information about CVE-2023-4303 on the Jenkins security advisory, NVD, and GitHub.
The CWE category of CVE-2023-4303 is CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').