First published: Thu Jun 30 2022(Updated: )
Jenkins build-metrics Plugin 1.3 does not escape the build description on one of its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Build/Update permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Build-metrics | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34784 is classified as a medium severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2022-34784, update the Jenkins build-metrics Plugin to version 1.4 or later, which addresses the escaping issue.
Users of Jenkins with build-metrics Plugin version 1.3 are affected by CVE-2022-34784 if they have Build/Update permissions.
CVE-2022-34784 is a stored cross-site scripting (XSS) vulnerability.
Yes, CVE-2022-34784 can be exploited remotely by attackers who have the necessary Build/Update permissions.