Rapid7 Vulnerability & Exploit Database

Jenkins Advisory 2024-01-24: CVE-2023-6148: Stored XSS vulnerability in Qualys Policy Compliance Scanning Connector Plugin

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Jenkins Advisory 2024-01-24: CVE-2023-6148: Stored XSS vulnerability in Qualys Policy Compliance Scanning Connector Plugin

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/09/2024
Created
01/26/2024
Added
01/25/2024
Modified
01/25/2024

Description

Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data

Solution(s)

  • jenkins-lts-upgrade-2_426_3
  • jenkins-upgrade-2_442

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;