Stored Cross-Site Scripting Vulnerability in Jenkins Promoted Builds Plugin
CVE-2022-29045

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 April 2022

Summary

The Jenkins Promoted Builds Plugin, specifically versions 873.v6149db_d64130 and earlier, is susceptible to a stored cross-site scripting vulnerability. This issue arises due to the plugin's failure to properly escape the name and description fields of Promoted Build parameters on views where these parameters are displayed. As a result, attackers with Item/Configure permissions could exploit this vulnerability to inject malicious scripts, leading to potential risks such as unauthorized access and data manipulation.

Affected Version(s)

Jenkins promoted builds Plugin <= 873.v6149db_d64130

Jenkins promoted builds Plugin 3.10.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.