Stored Cross-Site Scripting Vulnerability in Jenkins Anchore Container Image Scanner Plugin
CVE-2022-41225

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
21 September 2022

Summary

The Anchore Container Image Scanner Plugin for Jenkins, specifically version 1.0.24 and earlier, is vulnerable to a stored cross-site scripting (XSS) attack. This vulnerability occurs due to improper escaping of content received from the Anchore engine API, allowing attackers to execute malicious scripts in the context of users' sessions. If an attacker has control over the API responses from the Anchore engine, they can exploit this flaw to inject malicious scripts, compromising the security of the Jenkins environment and potentially exposing sensitive data.

Affected Version(s)

Jenkins Anchore Container Image Scanner Plugin <= 1.0.24

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.