| Added |
CPE Configuration |
|
OR
*cpe:2.3:a:jenkins:gitlab_hook:*:*:*:*:*:jenkins:*:* versions up to (including) 1.4.2 |
| Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:N/I:P/A:N) |
| Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism |
| Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| Added |
CWE |
|
NIST CWE-79 |
| Changed |
Reference Type |
http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html No Types Assigned |
http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html Exploit, Third Party Advisory, VDB Entry |
| Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2020/01/15/1 No Types Assigned |
http://www.openwall.com/lists/oss-security/2020/01/15/1 Mailing List, Third Party Advisory |
| Changed |
Reference Type |
https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683 No Types Assigned |
https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683 Vendor Advisory |