CVE-2022-34190
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins Maven Metadata Plugin For Jenkins CI Server Plugin from Jenkins Project contain the following vulnerability:
Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
- CVE-2022-34190 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins Maven Metadata Plugin for Jenkins CI server Plugin version <= 2.1
- Affected Vendor/Software:
Jenkins project - Jenkins Maven Metadata Plugin for Jenkins CI server Plugin version ?> 2.1
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_Maven_Metadata_Plugin_for_Jenkins_CI_server_Plugin | <= 2.1 |
Jenkins Project | Jenkins_Maven_Metadata_Plugin_for_Jenkins_CI_server_Plugin | ?> 2.1 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34190 : Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the nam… twitter.com/i/web/status/1… | 2022-06-22 14:52:01 |
![]() |
Jenkins Maven Metadata Plugin for Jenkins CI server Plugin cross-site scripting | CVE-2022-34190 -… twitter.com/i/web/status/1… | 2022-06-23 09:02:29 |
![]() |
Jenkins - CVE-2022-34190: jenkins.io/security/advis… | 2022-06-23 19:00:10 |