First published: Wed Sep 21 2022(Updated: )
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the `l:helpIcon` UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component. As of publication, the Jenkins security team is unaware of any exploitable help icon/tooltip in Jenkins core or plugins published by the Jenkins project. The vast majority of help icons use the `l:help` component instead of l:helpIcon. The few known instances of `l:helpIcon` do not have user-controllable tooltip contents.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | >=2.367<=2.369 | |
Jenkins Jenkins | >=2.367<2.370 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.367<2.370 | 2.370 |
>=2.367<2.370 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-41224.
CVE-2022-41224 has a severity level of medium.
An attacker can exploit CVE-2022-41224 by controlling tooltips for the l:helpIcon UI component in Jenkins 2.367 through 2.369, resulting in a stored cross-site scripting (XSS) vulnerability.
Jenkins versions 2.367 through 2.369 (inclusive) are affected by CVE-2022-41224.
You can find more information about CVE-2022-41224 at the following link: [https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2886](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2886)