First published: Wed Dec 07 2022(Updated: )
Jenkins Checkmarx Plugin 2022.3.3 and earlier does not escape values returned from the Checkmarx service API before inserting them into HTML reports, resulting in a stored cross-site scripting (XSS) vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Checkmarx | <2022.4.3 | |
<2022.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46684 is a vulnerability in the Jenkins Checkmarx Plugin that allows for stored cross-site scripting (XSS) attacks.
CVE-2022-46684 has a severity rating of 5.4, which is considered medium.
Jenkins Checkmarx Plugin versions up to and including 2022.3.3 are affected by CVE-2022-46684.
The CWE for CVE-2022-46684 is 79, which is for Cross-Site Scripting (XSS) vulnerabilities.
To fix CVE-2022-46684, upgrade to Jenkins Checkmarx Plugin version 2022.4.3 or later.