Stored Cross-Site Scripting Vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin
CVE-2022-34191
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 June 2022
Summary
The NS-ND Integration Performance Publisher Plugin for Jenkins prior to version 4.8.0.77 contains a vulnerability where it fails to properly escape the names of NetStorm Test parameters. This oversight allows attackers with Item/Configure permissions to potentially exploit the application by injecting malicious scripts that can be executed in the context of the user's session, leading to unauthorized data access and other harmful actions.
Affected Version(s)
Jenkins NS-ND Integration Performance Publisher Plugin <= 4.8.0.77
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved