First published: Wed Jan 12 2022(Updated: )
Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:matrix-project | <1.18.1 | 1.18.1 |
maven/org.jenkins-ci.plugins:matrix-project | =1.19 | 1.20 |
Jenkins Matrix Project Jenkins | <=1.19 | |
oracle communications Cloud native core automated test suite | =1.9.0 | |
Jenkins Matrix Project | <=1.19 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20615 is a vulnerability in Jenkins Matrix Project Plugin versions 1.19 and earlier that allows for stored cross-site scripting (XSS) attacks.
CVE-2022-20615 has a severity rating of 5.4 (medium).
CVE-2022-20615 affects Jenkins Matrix Project Plugin versions 1.19 and earlier, allowing for stored cross-site scripting (XSS) attacks.
To fix CVE-2022-20615, upgrade Jenkins Matrix Project Plugin to version 1.20 or later.
You can find more information about CVE-2022-20615 at the following references: [Link 1](http://www.openwall.com/lists/oss-security/2022/01/12/6), [Link 2](https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2017), [Link 3](https://www.oracle.com/security-alerts/cpuapr2022.html).