First published: Wed Sep 21 2022(Updated: )
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.134 and earlier does not escape configuration options of the Execute NetStorm/NetCloud Test build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ns-nd Integration Performance Publisher | <=4.8.0.134 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41229 is categorized as a stored cross-site scripting (XSS) vulnerability.
To mitigate CVE-2022-41229, update the Jenkins NS-ND Integration Performance Publisher Plugin to version 4.8.0.135 or later.
An attacker needs Item/Configure permission to exploit CVE-2022-41229.
CVE-2022-41229 affects all versions of the Jenkins NS-ND Integration Performance Publisher Plugin up to and including 4.8.0.134.
CVE-2022-41229 can lead to stored cross-site scripting (XSS), allowing attackers to execute malicious scripts in users' browsers.