CVE-2022-34178
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins Embeddable Build Status Plugin from Jenkins Project contain the following vulnerability:
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
- CVE-2022-34178 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins Embeddable Build Status Plugin version = 2.0.3
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_Embeddable_Build_Status_Plugin | = 2.0.3 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34178 : Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build… twitter.com/i/web/status/1… | 2022-06-22 14:47:55 |
![]() |
Jenkins Embeddable Build Status Plugin cross-site scripting | CVE-2022-34178 - redpacketsecurity.com/jenkins-embedd… #CVE… twitter.com/i/web/status/1… | 2022-06-23 09:02:29 |
![]() |
Jenkins - CVE-2022-34178: jenkins.io/security/advis… | 2022-06-23 19:00:12 |