CVE-2022-43409 (Medium) detected in workflow-support-1.11.jar
Opened this issue · 0 comments
CVE-2022-43409 - Medium Severity Vulnerability
Vulnerable Library - workflow-support-1.11.jar
Library home page: https://wiki.jenkins-ci.org/display/JENKINS/Workflow+Plugin
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jenkins-ci/plugins/workflow/workflow-support/1.11/workflow-support-1.11.jar
Dependency Hierarchy:
- workflow-job-1.11.jar (Root Library)
- ❌ workflow-support-1.11.jar (Vulnerable Library)
Found in HEAD commit: 97ed2b7fe477b78f0b26191e5950825314db7b2c
Found in base branch: master
Vulnerability Details
Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.
Publish Date: 2022-10-19
URL: CVE-2022-43409
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins.workflow:workflow-support:839.v35e2736cfd5c
Step up your Open Source Security Game with Mend here