First published: Thu Jun 30 2022(Updated: )
Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins GitLab | <=1.5.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34777 has a medium severity level due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2022-34777, upgrade the Jenkins GitLab Plugin to version 1.5.35 or later.
CVE-2022-34777 affects users of Jenkins GitLab Plugin versions 1.5.34 and earlier.
CVE-2022-34777 is a stored cross-site scripting (XSS) vulnerability.
Exploitation of CVE-2022-34777 requires attackers to have Item/Configure permissions.