Stored Cross-Site Scripting Vulnerability in Jenkins DotCi Plugin by Jenkins
CVE-2022-41239
5.4MEDIUM
Summary
The Jenkins DotCi Plugin versions prior to 2.40.00 are affected by a stored cross-site scripting vulnerability. This issue arises from the failure to properly escape the GitHub user name parameter in commit notifications, which allows an attacker to inject malicious scripts that are stored and later executed in a user's browser context. This can lead to unauthorized actions, data theft, and overall compromised user experience. It is essential for users to update to the latest version of the plugin to mitigate this risk.
Affected Version(s)
Jenkins DotCi Plugin <= 2.40.00
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved