CVE-2022-34191
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins NS-ND Integration Performance Publisher Plugin from Jenkins Project contain the following vulnerability:
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
- CVE-2022-34191 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins NS-ND Integration Performance Publisher Plugin version <= 4.8.0.77
- Affected Vendor/Software:
Jenkins project - Jenkins NS-ND Integration Performance Publisher Plugin version ?> 4.8.0.77
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_NS-ND_Integration_Performance_Publisher_Plugin | <= 4.8.0.77 |
Jenkins Project | Jenkins_NS-ND_Integration_Performance_Publisher_Plugin | ?> 4.8.0.77 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34191 : Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the na… twitter.com/i/web/status/1… | 2022-06-22 14:52:27 |
![]() |
Jenkins NS-ND Integration Performance Publisher Plugin cross-site scripting | CVE-2022-34191 -… twitter.com/i/web/status/1… | 2022-06-23 09:02:30 |
![]() |
Jenkins - CVE-2022-34191: jenkins.io/security/advis… | 2022-06-23 19:00:06 |
![]() |
*VULNERABILITY* CVE-2022-34191 CW.cyberwire.info/SSknkm #cybersecurity #vulnerability #cyberwire | 2022-06-23 23:06:02 |