|
|||
Rule General Information |
---|
Release Date: | 2022-07-12 | |
Rule Name: | Jenkins JUnit Plugin Stored Cross Site Scripting Vulnerability (CVE-2022-34176) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission. | |
Impact: | An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed. | |
Affected OS: | Windows, Others | |
Reference: | https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2760 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2760 |