Stored XSS Vulnerability in Jenkins Autocomplete Parameter Plugin
CVE-2022-30970
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 17 May 2022
Summary
The Autocomplete Parameter Plugin for Jenkins has a vulnerability that allows attackers to exploit stored cross-site scripting (XSS) in certain parameter names. This issue arises from unsafe references to Dropdown Autocomplete and Auto Complete String parameters within the plugin's JavaScript embedded in view definitions. Attackers with Item/Configure permissions can trigger this vulnerability, posing significant security risks to Jenkins instances using affected versions of the plugin.
Affected Version(s)
Jenkins Autocomplete Parameter Plugin <= 1.1
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved