Stored XSS vulnerability in Jenkins Contrast Continuous Application Security Plugin
        
  High severity
        
          GitHub Reviewed
      
        Published
          Oct 19, 2022 
          to the GitHub Advisory Database
          •
          Updated Jan 14, 2024 
      
  
Package
Affected versions
<= 3.9
  Patched versions
3.10
  Description
        Published by the National Vulnerability Database
      Oct 19, 2022 
    
  
        Published to the GitHub Advisory Database
      Oct 19, 2022 
    
  
        Reviewed
      Oct 19, 2022 
    
  
        Last updated
      Jan 14, 2024 
    
  
Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses.
Contrast Continuous Application Security Plugin 3.10 escapes the affected data.
References