First published: Wed Jun 22 2022(Updated: )
In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | >=2.321<=2.355 | |
Jenkins Jenkins | >=2.332.1<=2.332.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34171 is a vulnerability in Jenkins versions 2.321 through 2.355 and LTS versions 2.332.1 through 2.332.3. It allows the HTML output for new symbol-based SVG icons to include certain attributes without proper escaping.
The severity of CVE-2022-34171 is medium, with a CVSS score of 6.1.
The affected software for CVE-2022-34171 includes Jenkins versions 2.321 through 2.355 and LTS versions 2.332.1 through 2.332.3.
To fix CVE-2022-34171, update Jenkins to a version beyond 2.355 or LTS version beyond 2.332.3.
More information about CVE-2022-34171 can be found at the following link: [CVE-2022-34171 Advisory](https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781).