CVE-2022-43409 (Medium) detected in workflow-support-838.va_3a_087b_4055b.jar #2774
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
untriaged
Issues that have not yet been triaged
CVE-2022-43409 - Medium Severity Vulnerability
Vulnerable Library - workflow-support-838.va_3a_087b_4055b.jar
The Jenkins Plugins Parent POM Project
Library home page: https://github.com/jenkinsci/workflow-support-plugin
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins.workflow/workflow-support/838.va_3a_087b_4055b/88ac7419e2d20c1432ffe92d94ca070286021a8e/workflow-support-838.va_3a_087b_4055b.jar
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.
Publish Date: 2022-10-19
URL: CVE-2022-43409
CVSS 3 Score Details (5.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins.workflow:workflow-support:839.v35e2736cfd5c
The text was updated successfully, but these errors were encountered: