Stored Cross-Site Scripting in Jenkins JUnit Plugin by Jenkins
CVE-2022-34176

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
23 June 2022

Summary

The Jenkins JUnit Plugin suffers from a stored cross-site scripting (XSS) vulnerability because it fails to properly escape the descriptions of test results. This security flaw can be exploited by attackers who possess Run or Update permissions, potentially allowing them to inject malicious scripts into the web application. This could lead to unauthorized actions or information disclosure, compromising the integrity and security of affected Jenkins instances.

Affected Version(s)

Jenkins JUnit Plugin <= 1119.va_a_5e9068da_d7

Jenkins JUnit Plugin 1.53.0.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.