First published: Wed Jun 22 2022(Updated: )
In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | >=2.320<=2.355 | |
Jenkins Jenkins | >=2.332.1<=2.332.3 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.346<2.346.1 | 2.346.1 |
maven/org.jenkins-ci.main:jenkins-core | >=2.320<2.332.4 | 2.332.4 |
maven/org.jenkins-ci.main:jenkins-core | >=2.350<2.356 | 2.356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34170 is a cross-site scripting (XSS) vulnerability in Jenkins.
CVE-2022-34170 has a severity rating of 6.1 (Medium).
Jenkins versions 2.320 through 2.355 and LTS versions 2.332.1 through 2.332.3 are affected by CVE-2022-34170.
To fix CVE-2022-34170, you should update Jenkins to a version that includes the security fix, as mentioned in the Jenkins security advisory (see reference).
You can find more information about CVE-2022-34170 in the Jenkins security advisory (see reference).