hygieia/hygieia-publisher-jenkins-plugin

CVE-2022-43409 (Medium) detected in workflow-support-1.11.jar

Opened this issue · 0 comments

CVE-2022-43409 - Medium Severity Vulnerability

Vulnerable Library - workflow-support-1.11.jar

Library home page: https://wiki.jenkins-ci.org/display/JENKINS/Workflow+Plugin

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jenkins-ci/plugins/workflow/workflow-support/1.11/workflow-support-1.11.jar

Dependency Hierarchy:

  • workflow-job-1.11.jar (Root Library)
    • workflow-support-1.11.jar (Vulnerable Library)

Found in HEAD commit: 97ed2b7fe477b78f0b26191e5950825314db7b2c

Found in base branch: master

Vulnerability Details

Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.

Publish Date: 2022-10-19

URL: CVE-2022-43409

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881

Release Date: 2022-10-19

Fix Resolution: org.jenkins-ci.plugins.workflow:workflow-support:839.v35e2736cfd5c


Step up your Open Source Security Game with Mend here