First published: Tue Aug 23 2022(Updated: )
Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Job Configuration History | <=1165.v8cc9fd1f4597 | |
<=1165.v8cc9fd1f4597 | ||
maven/org.jenkins-ci.plugins:jobConfigHistory | <=1165.v8cc9fd1f4597 | 1166.vc9f255f45b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38664 is a vulnerability in the Jenkins Job Configuration History Plugin which allows for a stored cross-site scripting (XSS) attack.
CVE-2022-38664 has a severity of medium, with a CVSS score of 5.4.
CVE-2022-38664 affects Jenkins Job Configuration History Plugin versions 1165.v8cc9fd1f4597 and earlier by allowing attackers to exploit a stored cross-site scripting (XSS) vulnerability through configuring job names.
To fix CVE-2022-38664, users should upgrade to a version later than 1165.v8cc9fd1f4597 of the Jenkins Job Configuration History Plugin.
More information about CVE-2022-38664 can be found in the advisory on the Jenkins website: https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2765