First published: Tue Apr 12 2022(Updated: )
Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1650628887-1.el7 | 2-plugins-0:3.11.1650628887-1.el7 |
redhat/jenkins | <2-plugins-0:4.10.1650890594-1.el8 | 2-plugins-0:4.10.1650890594-1.el8 |
redhat/jenkins | <2-plugins-0:4.6.1653312933-1.el8 | 2-plugins-0:4.6.1653312933-1.el8 |
redhat/jenkins | <2-plugins-0:4.7.1652967082-1.el8 | 2-plugins-0:4.7.1652967082-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1646993358-1.el8 | 2-plugins-0:4.8.1646993358-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1651754460-1.el8 | 2-plugins-0:4.9.1651754460-1.el8 |
Jenkins Credentials | <2.6.1.1 | |
Jenkins Credentials | >=1055.v1346ba467ba1<1074.1076.v39c30cecb_0e2 | |
Jenkins Credentials | >=1105.vb_4e24a_c78b_81<1112.vc87b_7a_3597f6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)