GHSA-mhp7-3393-pfqr

Suggest an improvement
Source
https://github.com/advisories/GHSA-mhp7-3393-pfqr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-mhp7-3393-pfqr/GHSA-mhp7-3393-pfqr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mhp7-3393-pfqr
Aliases
Published
2022-06-24T00:00:31Z
Modified
2023-12-06T01:02:23.026344Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Cross-site Scripting vulnerability in Jenkins
Details

Since Jenkins 2.340, symbol-based icons unescape previously escaped values of tooltip parameters.

This vulnerability is known to be exploitable by attackers with Job/Configure permission.

Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability. Symbol-based icons no longer unescape values of tooltip parameters.

Database specific
{
    "nvd_published_at": "2022-06-23T17:15:00Z",
    "github_reviewed_at": "2022-12-06T00:02:19Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22",
        "CWE-79"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.main:jenkins-core

Package

Name
org.jenkins-ci.main:jenkins-core
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.main/jenkins-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.340
Fixed
2.356

Affected versions

2.*

2.340
2.341
2.342
2.343
2.344
2.345
2.346
2.346.1
2.346.2
2.346.3
2.347
2.348
2.349
2.350
2.354
2.355

Maven / org.jenkins-ci.main:jenkins-core

Package

Name
org.jenkins-ci.main:jenkins-core
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.main/jenkins-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.332
Fixed
2.332.4

Affected versions

2.*

2.332
2.332.1
2.332.2
2.332.3