-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:fortify | maven | <= 22.1.38 | 22.2.39 |
The vulnerability stems from unescaped error messages in form validation. The commit shows critical changes where errorWithMarkup() was replaced with error() combined with HTML tag removal via removeHtmlFormatting(). The testSscConnection method (previously part of doTestConnection) handles SSC server connection errors and was the primary injection vector. The direct use of errorWithMarkup() with raw exception messages made these functions vulnerable to HTML injection.
A Semantic Attack on Google Gemini - Read the Latest Research