Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cj9j-v8jp-6hm9 Cross-site Scripting in Jenkins Autocomplete Parameter Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T07:03:40.038Z

Reserved: 2022-05-16T00:00:00

Link: CVE-2022-30970

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-17T15:15:11.257

Modified: 2024-11-21T07:03:39.057

Link: CVE-2022-30970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses