First published: Thu Jun 30 2022(Updated: )
Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Plot | <=2.1.10 | |
maven/org.jenkins-ci.plugins:plot | <2.1.11 | 2.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34783 has a medium severity level due to its potential for stored cross-site scripting (XSS) exploitation.
To fix CVE-2022-34783, upgrade to Jenkins Plot Plugin version 2.1.11 or later.
CVE-2022-34783 affects users of Jenkins Plot Plugin versions 2.1.10 and earlier who have Item/Configure permissions.
CVE-2022-34783 is classified as a stored cross-site scripting (XSS) vulnerability.
Yes, CVE-2022-34783 can be exploited remotely by attackers who have the appropriate permissions.