CVE-2022-30970 – org.jenkins-ci.plugins:autocomplete-parameter
Package
Manager: maven
Name: org.jenkins-ci.plugins:autocomplete-parameter
Vulnerable Version: >=0 <=1.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.31598 pctl0.9665
Details
Cross-site Scripting in Jenkins Autocomplete Parameter Plugin Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. While this looks similar to SECURITY-2729, this is an independent problem and exploitable even on views rendering parameters that otherwise attempt to prevent XSS vulnerabilities in parameter names.
Metadata
Created: 2022-05-18T00:00:42Z
Modified: 2022-12-02T20:09:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cj9j-v8jp-6hm9/GHSA-cj9j-v8jp-6hm9.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-cj9j-v8jp-6hm9
Finding: F425
Auto approve: 1