CVE-2022-36905

Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.2 and earlier does not perform URL validation for the Repository Base URL of List maven artifact versions parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:maven_metadata:*:*:*:*:*:jenkins_ci:*:*

History

21 Nov 2024, 07:14

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/07/27/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/07/27/1 - Mailing List, Third Party Advisory
References () https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2686 - Vendor Advisory () https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2686 - Vendor Advisory

02 Nov 2023, 21:04

Type Values Removed Values Added
CWE CWE-79

25 Oct 2023, 18:17

Type Values Removed Values Added
CWE CWE-79

Information

Published : 2022-07-27 15:15

Updated : 2024-11-21 07:14


NVD link : CVE-2022-36905

Mitre link : CVE-2022-36905

CVE.ORG link : CVE-2022-36905


JSON object : View

Products Affected

jenkins

  • maven_metadata
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')