CVE-2022-29040 – org.jenkins-ci.tools:git-parameter
Package
Manager: maven
Name: org.jenkins-ci.tools:git-parameter
Vulnerable Version: >=0 <0.9.16
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.31598 pctl0.96651
Details
Stored XSS vulnerability in Jenkins Git Parameter Plugin Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Metadata
Created: 2022-04-13T00:00:17Z
Modified: 2022-04-29T04:21:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-fcr6-6cph-vmcm/GHSA-fcr6-6cph-vmcm.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-fcr6-6cph-vmcm
Finding: F425
Auto approve: 1