First published: Wed Jun 22 2022(Updated: )
A flaw was found in the JUnit Jenkins plugin. The manipulation with an unknown input leads to a Cross-site scripting vulnerability, impacting the integrity. This flaw allows an attacker to inject arbitrary HTML and script code into the website.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.10.1663147786-1.el8 | 2-plugins-0:4.10.1663147786-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1672842762-1.el8 | 2-plugins-0:4.8.1672842762-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1667460322-1.el8 | 2-plugins-0:4.9.1667460322-1.el8 |
Jenkins Junit | <=1119.va_a_5e9068da_d7 | |
<=1119.va_a_5e9068da_d7 | ||
redhat/JUnit Plugin | <1119.1121. | 1119.1121. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-34176 has a high severity level due to its potential to allow cross-site scripting attacks.
To fix CVE-2022-34176, update the Jenkins JUnit Plugin to version 1119.1121 or later.
CVE-2022-34176 can lead to manipulation of the integrity of the Jenkins interface by allowing the injection of arbitrary HTML and script code.
CVE-2022-34176 affects Jenkins JUnit Plugin versions up to and including 1119.va_a_5e9068da_d7.
Yes, if you are using Jenkins JUnit Plugin versions earlier than 1119.1121, your installation is vulnerable to CVE-2022-34176.