Stored Cross-Site Scripting in Jenkins JUnit Plugin by Jenkins
CVE-2022-45380
5.4MEDIUM
Summary
The Jenkins JUnit Plugin prior to version 1159.v0b_396e1e07dd contains a vulnerability that allows attackers with Item/Configure permission to inject malicious scripts through test report output. This issue arises from the plugin's improper handling of HTTP(S) URLs, converting them to clickable links without adequate sanitization, thus exposing users to potential exploits. It is crucial for administrators to assess and upgrade their systems accordingly to prevent unauthorized access and maintain the integrity of the Jenkins environment.
Affected Version(s)
Jenkins JUnit Plugin <= 1159.v0b_396e1e07dd
Jenkins JUnit Plugin 1143.1145.v81b_b_9579a_019
Jenkins JUnit Plugin 1119.1122.v750e65d31b_db_
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved