Stored XSS vulnerability in Jenkins Contrast Continuous Application Security Plugin
High severity
GitHub Reviewed
Published
Oct 19, 2022
to the GitHub Advisory Database
•
Updated Jan 14, 2024
Package
Affected versions
<= 3.9
Patched versions
3.10
Description
Published by the National Vulnerability Database
Oct 19, 2022
Published to the GitHub Advisory Database
Oct 19, 2022
Reviewed
Oct 19, 2022
Last updated
Jan 14, 2024
Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses.
Contrast Continuous Application Security Plugin 3.10 escapes the affected data.
References