First published: Tue Apr 12 2022(Updated: )
A flaw was found in the Jenkins Jira plugin. The Jenkins Jira plugin does not escape the name and description of a Jira Issue and Jira Release Version parameters on views displaying parameters. This issue results in a stored Cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.10.1650890594-1.el8 | 2-plugins-0:4.10.1650890594-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1651754460-1.el8 | 2-plugins-0:4.9.1651754460-1.el8 |
Jenkins Jira | <3.6.1 | |
Jenkins Jira | =3.7 | |
maven/org.jenkins-ci.plugins:jira | <3.6.1 | 3.6.1 |
maven/org.jenkins-ci.plugins:jira | >=3.7.0<3.7.1 | 3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-29041.
The severity of CVE-2022-29041 is high.
Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, are affected by CVE-2022-29041.
CVE-2022-29041 can be exploited through a stored cross-site scripting (XSS) vulnerability.
The recommended remedy for CVE-2022-29041 is to upgrade to version 3.7.1 of the Jenkins Jira Plugin.