Stored Cross-Site Scripting Vulnerability in Jenkins Mask Passwords Plugin
CVE-2022-29043
5.4MEDIUM
Summary
The Jenkins Mask Passwords Plugin, versions 3.0 and earlier, suffers from a stored cross-site scripting (XSS) vulnerability. This flaw arises because it does not properly escape the name and description of Non-Stored Password parameters when displayed in views. Attackers with Item/Configure permission can exploit this vulnerability, potentially leading to unauthorized actions and data exposure. It is essential for users to review and update their installations to combat this security risk.
Affected Version(s)
Jenkins Mask Passwords Plugin <= 3.0
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved