Stored XSS Vulnerability in Jenkins Autocomplete Parameter Plugin
CVE-2022-30970

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
17 May 2022

Summary

The Autocomplete Parameter Plugin for Jenkins has a vulnerability that allows attackers to exploit stored cross-site scripting (XSS) in certain parameter names. This issue arises from unsafe references to Dropdown Autocomplete and Auto Complete String parameters within the plugin's JavaScript embedded in view definitions. Attackers with Item/Configure permissions can trigger this vulnerability, posing significant security risks to Jenkins instances using affected versions of the plugin.

Affected Version(s)

Jenkins Autocomplete Parameter Plugin <= 1.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.