Stored XSS vulnerability in Jenkins Authorize Project Plugin
        
  High severity
        
          GitHub Reviewed
      
        Published
          Nov 13, 2024 
          to the GitHub Advisory Database
          •
          Updated Nov 14, 2024 
      
  
Package
Affected versions
< 1.8.0
  Patched versions
1.8.0
  Description
        Published by the National Vulnerability Database
      Nov 13, 2024 
    
  
        Published to the GitHub Advisory Database
      Nov 13, 2024 
    
  
        Reviewed
      Nov 14, 2024 
    
  
        Last updated
      Nov 14, 2024 
    
  
Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.
References