First published: Wed Oct 25 2023(Updated: )
Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Github | <=1.37.3 | |
maven/com.coravy.hudson.plugins.github:github | <1.37.3.1 | 1.37.3.1 |
<=1.37.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46650 is a vulnerability in Jenkins GitHub Plugin 1.37.3 and earlier that allows for stored cross-site scripting (XSS) attacks.
CVE-2023-46650 has a severity rating of high, with a severity value of 8.
This vulnerability can be exploited by attackers with Item/Configure permission, allowing them to conduct stored cross-site scripting attacks.
The affected software is Jenkins GitHub Plugin 1.37.3 and earlier.
To fix CVE-2023-46650, update to version 1.37.3.1 of the Jenkins GitHub Plugin.