CVE-2022-34193
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins Package Version Plugin from Jenkins Project contain the following vulnerability:
Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
- CVE-2022-34193 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins Package Version Plugin version <= 1.0.1
- Affected Vendor/Software:
Jenkins project - Jenkins Package Version Plugin version ?> 1.0.1
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_Package_Version_Plugin | <= 1.0.1 |
Jenkins Project | Jenkins_Package_Version_Plugin | ?> 1.0.1 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34193 : Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version param… twitter.com/i/web/status/1… | 2022-06-22 14:53:00 |
![]() |
Jenkins Package Version Plugin cross-site scripting | CVE-2022-34193 - redpacketsecurity.com/jenkins-packag… #CVE #Vulnerability… twitter.com/i/web/status/1… | 2022-06-23 09:02:26 |
![]() |
Jenkins - CVE-2022-34193: jenkins.io/security/advis… | 2022-06-23 19:00:16 |
![]() |
*VULNERABILITY* CVE-2022-34193 CW.cyberwire.info/SSknw2 #cybersecurity #vulnerability #cyberwire | 2022-06-23 23:07:10 |
![]() |
CVE-2022-34193 | 2022-06-22 15:38:16 |