Cross-site Scripting (XSS) Affecting se.diabol.jenkins.pipeline:delivery-pipeline-plugin package, versions [,1.0.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.06% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-SEDIABOLJENKINSPIPELINE-32175
  • published8 Apr 2018
  • disclosed26 Oct 2017
  • creditViktor Gazdag

Introduced: 26 Oct 2017

CVE-2017-1000404  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade se.diabol.jenkins.pipeline:delivery-pipeline-plugin to version 1.0.8 or higher.

Overview

se.diabol.jenkins.pipeline:delivery-pipeline-plugin provides visualisation of delivery/build pipelines in Jenkins.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attack through specially crafted URLs due to using the unescaped content of the query parameter 'fullscreen' in its JavaScript.

Details

<>

CVSS Scores

version 3.1