First published: Tue Feb 15 2022(Updated: )
Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name of custom promotion levels, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Promoted Builds | <=1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25202 is classified as a medium severity vulnerability due to the potential for stored cross-site scripting (XSS) attacks.
CVE-2022-25202 affects users of Jenkins Promoted Builds (Simple) Plugin versions 1.9 and earlier.
To fix CVE-2022-25202, upgrade the Jenkins Promoted Builds (Simple) Plugin to version 1.10 or later.
The impact of CVE-2022-25202 is that attackers with Overall/Administer permission can execute malicious scripts in the context of users' browsers.
CVE-2022-25202 represents a common type of vulnerability known as stored XSS, which can be found in web applications with inadequate input sanitization.