logo

CVE-2022-29037 org.jenkins-ci.plugins:cvs

Package

Manager: maven
Name: org.jenkins-ci.plugins:cvs
Vulnerable Version: >=0 <2.19.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.2585 pctl0.96063

Details

Stored XSS in Jenkins CVS Plugin Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Metadata

Created: 2022-04-13T00:00:18Z
Modified: 2022-05-03T20:52:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-ghq2-m3pq-qf3p/GHSA-ghq2-m3pq-qf3p.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-ghq2-m3pq-qf3p
Finding: F425
Auto approve: 1