Stored Cross-Site Scripting Vulnerability in Jenkins DotCi Plugin by Jenkins
CVE-2022-41239

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
21 September 2022

Summary

The Jenkins DotCi Plugin versions prior to 2.40.00 are affected by a stored cross-site scripting vulnerability. This issue arises from the failure to properly escape the GitHub user name parameter in commit notifications, which allows an attacker to inject malicious scripts that are stored and later executed in a user's browser context. This can lead to unauthorized actions, data theft, and overall compromised user experience. It is essential for users to update to the latest version of the plugin to mitigate this risk.

Affected Version(s)

Jenkins DotCi Plugin <= 2.40.00

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.