CVE-2022-45380

Severity
5.4MEDIUM
EPSS
2.0%
top 16.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15
Latest updateNov 16

Description

Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages3 packages

Mavenorg.jenkins-ci.plugins:junit< 1160.vf1f01a_a_ea_b_7f
CVEListV5jenkins_project/jenkins_junit_pluginunspecified1159.v0b_396e1e07dd
NVDjenkins/junit< 1160.vf1f01a_a_ea_b_7f

🔴Vulnerability Details

3
OSV
Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion2022-11-16
GHSA
Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion2022-11-16
CVEList
CVE-2022-45380: Jenkins JUnit Plugin 11592022-11-15

📋Vendor Advisories

3
Red Hat
jenkins-plugin/JUnit: Stored XSS vulnerability in JUnit Plugin2022-11-15
Jenkins
Jenkins Security Advisory 2022-11-152022-11-15
Microsoft
Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability 2022-11-08
CVE-2022-45380 (MEDIUM CVSS 5.4) | Jenkins JUnit Plugin 1159.v0b_396e1 | cvebase.io