CVE-2022-34777

Severity
5.4MEDIUM
EPSS
24.8%
top 3.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 30
Latest updateJul 1

Description

Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_gitlab_pluginunspecified1.5.34
NVDjenkins/gitlab1.5.34

🔴Vulnerability Details

3
OSV
Cross-site Scripting in Jenkins GitLab Plugin2022-07-01
GHSA
Cross-site Scripting in Jenkins GitLab Plugin2022-07-01
CVEList
CVE-2022-34777: Jenkins GitLab Plugin 12022-06-30

📋Vendor Advisories

2
GitLab
CVE-2022-34777: Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a sto2022-06-30
Jenkins
Jenkins Security Advisory 2022-06-302022-06-30
CVE-2022-34777 (MEDIUM CVSS 5.4) | Jenkins GitLab Plugin 1.5.34 and ea | cvebase.io