Stored Cross-Site Scripting in Jenkins Selection Tasks Plugin
CVE-2022-30967

5.4MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
17 May 2022

What is CVE-2022-30967?

The Jenkins Selection Tasks Plugin prior to version 1.0 is susceptible to a stored cross-site scripting (XSS) vulnerability. This issue arises from the failure to properly escape the name and description of Script Selection task variable parameters when rendered in views that display these parameters. Attackers possessing Item/Configure permissions may exploit this vulnerability to inject malicious scripts into the application's interface, potentially compromising user sessions or executing unauthorized actions.

Affected Version(s)

Jenkins Selection tasks Plugin <= 1.0

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.