Stored Cross-Site Scripting in Jenkins JUnit Plugin by Jenkins
CVE-2022-34176
5.4MEDIUM
Summary
The Jenkins JUnit Plugin suffers from a stored cross-site scripting (XSS) vulnerability because it fails to properly escape the descriptions of test results. This security flaw can be exploited by attackers who possess Run or Update permissions, potentially allowing them to inject malicious scripts into the web application. This could lead to unauthorized actions or information disclosure, compromising the integrity and security of affected Jenkins instances.
Affected Version(s)
Jenkins JUnit Plugin <= 1119.va_a_5e9068da_d7
Jenkins JUnit Plugin 1.53.0.1
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved