First published: Tue Apr 12 2022(Updated: )
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Git Parameter | <=0.9.15 | |
maven/org.jenkins-ci.tools:git-parameter | <0.9.16 | 0.9.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of Jenkins Git Parameter Plugin is CVE-2022-29040.
The severity of CVE-2022-29040 is medium, with a CVSS score of 5.4.
The affected software version of CVE-2022-29040 is Jenkins Git Parameter Plugin 0.9.15 and earlier.
The CWE category of CVE-2022-29040 is CWE-79, which represents Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
To fix the vulnerability in Jenkins Git Parameter Plugin, you should update to a version later than 0.9.15.