CVE-2022-30965

Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:promoted_builds:*:*:*:*:*:jenkins:*:*

History

25 May 2022, 16:21

Type Values Removed Values Added
First Time Jenkins
Jenkins promoted Builds
References (CONFIRM) https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717 - (CONFIRM) https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 5.4
CWE CWE-79
CPE cpe:2.3:a:jenkins:promoted_builds:*:*:*:*:*:jenkins:*:*

17 May 2022, 15:36

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-17 15:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-30965

Mitre link : CVE-2022-30965

CVE.ORG link : CVE-2022-30965


JSON object : View

Products Affected

jenkins

  • promoted_builds
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')