First published: Wed Jun 22 2022(Updated: )
Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Filesystem List Parameter Plugin | <=0.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-34187 is rated as high due to the potential for stored cross-site scripting (XSS) attacks.
CVE-2022-34187 affects users of Jenkins Filesystem List Parameter Plugin versions 0.0.7 and earlier.
To fix CVE-2022-34187, upgrade to Jenkins Filesystem List Parameter Plugin version 0.0.8 or later.
Exploiting CVE-2022-34187 can allow attackers with Item/Configure permission to execute malicious scripts in the context of other users.
There are no recommended workarounds for CVE-2022-34187; upgrading to a secure version is the best solution.