CVE-2022-34197
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins Sauce OnDemand Plugin from Jenkins Project contain the following vulnerability:
Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
- CVE-2022-34197 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins Sauce OnDemand Plugin version <= 1.204
- Affected Vendor/Software:
Jenkins project - Jenkins Sauce OnDemand Plugin version ?> 1.204
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_Sauce_OnDemand_Plugin | <= 1.204 |
Jenkins Project | Jenkins_Sauce_OnDemand_Plugin | ?> 1.204 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34197 : Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce… twitter.com/i/web/status/1… | 2022-06-22 14:54:18 |
![]() |
Jenkins Sauce OnDemand Plugin cross-site scripting | CVE-2022-34197 - redpacketsecurity.com/jenkins-sauce-… #CVE #Vulnerability… twitter.com/i/web/status/1… | 2022-06-23 09:02:28 |
![]() |
Jenkins - CVE-2022-34197: jenkins.io/security/advis… | 2022-06-23 19:00:12 |
![]() |
*VULNERABILITY* CVE-2022-34197 CW.cyberwire.info/SSknvP #cybersecurity #vulnerability #cyberwire | 2022-06-23 23:07:05 |
![]() |
CVE-2022-34197 | 2022-06-22 15:38:19 |