First published: Wed Jun 22 2022(Updated: )
Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Image Tag Parameter | <=1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34189 is categorized as a medium-severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2022-34189, upgrade the Jenkins Image Tag Parameter Plugin to version 1.11 or later.
CVE-2022-34189 affects users of Jenkins who have the Image Tag Parameter Plugin version 1.10 or earlier and Item/Configure permissions.
CVE-2022-34189 can be exploited to execute stored XSS attacks against users viewing parameters in Jenkins.
If your Jenkins instance is vulnerable to CVE-2022-34189, you should update the Image Tag Parameter Plugin immediately to mitigate risks.