-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.qualys.plugins:qualys-pc | maven | < 1.0.6 | 1.0.6 |
The vulnerability stems from two key flaws: 1) Missing permission checks in the connectivity test endpoint handler (likely a doCheck method in the DescriptorImpl class), allowing low-privileged users to execute it. 2) Unsanitized rendering of external API responses in Jenkins' web UI (via a response processing method), enabling XSS. These functions are standard patterns in Jenkins plugin development for connection validation and UI rendering, aligning with the described attack vectors.