Jenkins Job Generator Plugin 1.22 and earlier does not escape the name and description of Generator Parameter and Generator Choice parameters on Job Generator jobs' Build With Parameters views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 | Vendor Advisory |
https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 - Vendor Advisory |
Information
Published : 2022-04-12 20:15
Updated : 2024-11-21 06:58
NVD link : CVE-2022-29042
Mitre link : CVE-2022-29042
CVE.ORG link : CVE-2022-29042
JSON object : View
Products Affected
jenkins
- job_generator
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')