Loading HuntDB...

CVE-2022-27202

UNKNOWN
Published 2022-03-15T16:45:48
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2022-27202. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Stored Cross-site Scripting vulnerability in Jenkins Extended Choice Parameter Plugin

GHSA-h2v5-3hpc-85j5

Advisory Details

Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Affected Packages

Maven org.jenkins-ci.plugins:extended-choice-parameter
ECOSYSTEM: ≥0 ≤346.vd87693c5a

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: March 16, 2022, Modified: November 30, 2022

References

Published: 2022-03-15T16:45:48
Last Modified: 2024-08-03T05:25:32.222Z
Copied to clipboard!