First published: Wed Jun 22 2022(Updated: )
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Embeddable Build Status | =2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34178 has been classified as a medium severity vulnerability due to its potential to cause reflected cross-site scripting (XSS).
To remediate CVE-2022-34178, upgrade the Jenkins Embeddable Build Status Plugin to version 2.0.4 or later.
CVE-2022-34178 is a reflected cross-site scripting (XSS) vulnerability caused by improper handling of the 'link' query parameter.
CVE-2022-34178 affects Jenkins Embeddable Build Status Plugin version 2.0.3.
Yes, CVE-2022-34178 can be exploited remotely if an attacker is able to craft a special URL to execute a cross-site scripting attack.