First published: Wed Jul 27 2022(Updated: )
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dynamic Extended Choice Parameter | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36902 is a vulnerability in Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier that allows stored cross-site scripting (XSS) attacks.
CVE-2022-36902 allows attackers with Item/Configure permission to exploit a stored cross-site scripting (XSS) vulnerability in Jenkins.
CVE-2022-36902 has a severity score of 5.4, which is classified as medium.
To fix CVE-2022-36902, you should update to the latest version of Jenkins Dynamic Extended Choice Parameter Plugin.
More information about CVE-2022-36902 can be found in the security advisory on the Jenkins website.