First published: Tue Apr 12 2022(Updated: )
Jenkins Mask Passwords Plugin 3.0 and earlier does not escape the name and description of Non-Stored Password parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Mask Passwords | <=3.0 | |
maven/org.jenkins-ci.plugins:mask-passwords | <3.1 | 3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-29043.
The severity level of CVE-2022-29043 is medium, with a severity value of 5.4.
The affected software for CVE-2022-29043 is Jenkins Mask Passwords Plugin 3.0 and earlier.
CVE-2022-29043 allows attackers with Item/Configure permission to exploit a stored cross-site scripting (XSS) vulnerability in Jenkins Mask Passwords Plugin 3.0 and earlier.
To fix CVE-2022-29043, it is recommended to upgrade to version 3.1 or later of the Jenkins Mask Passwords Plugin.