Stored Cross-Site Scripting Vulnerability in Jenkins Custom Checkbox Parameter Plugin
CVE-2022-43425
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 19 October 2022
Summary
The Jenkins Custom Checkbox Parameter Plugin versions 1.4 and earlier are prone to a stored cross-site scripting (XSS) vulnerability. This occurs due to the lack of proper escaping for the name and description fields of Custom Checkbox Parameter parameters on views that display these parameters. Attackers with 'Item/Configure' permissions can exploit this vulnerability to inject malicious scripts, potentially compromising sensitive data and impacting user sessions.
Affected Version(s)
Jenkins Custom Checkbox Parameter Plugin <= 1.4
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved