Stored Cross-Site Scripting Vulnerability in Jenkins Mask Passwords Plugin
CVE-2022-29043

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 April 2022

Summary

The Jenkins Mask Passwords Plugin, versions 3.0 and earlier, suffers from a stored cross-site scripting (XSS) vulnerability. This flaw arises because it does not properly escape the name and description of Non-Stored Password parameters when displayed in views. Attackers with Item/Configure permission can exploit this vulnerability, potentially leading to unauthorized actions and data exposure. It is essential for users to review and update their installations to combat this security risk.

Affected Version(s)

Jenkins Mask Passwords Plugin <= 3.0

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.