First published: Wed Jun 22 2022(Updated: )
Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins ontrack Jenkins | <=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34192 has been classified as a medium severity stored cross-site scripting (XSS) vulnerability.
To fix CVE-2022-34192, update the Jenkins ontrack plugin to version 4.0.1 or later.
CVE-2022-34192 affects Jenkins ontrack Jenkins Plugin versions 4.0.0 and earlier.
Yes, CVE-2022-34192 can be exploited remotely by attackers with access to view parameters in Jenkins.
CVE-2022-34192 allows attackers to execute arbitrary JavaScript through stored cross-site scripting (XSS) in Jenkins.