opensearch-build
opensearch-build copied to clipboard
CVE-2022-43409 (Medium) detected in workflow-support-838.va_3a_087b_4055b.jar
CVE-2022-43409 - Medium Severity Vulnerability
Vulnerable Library - workflow-support-838.va_3a_087b_4055b.jar
The Jenkins Plugins Parent POM Project
Library home page: https://github.com/jenkinsci/workflow-support-plugin
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins.workflow/workflow-support/838.va_3a_087b_4055b/88ac7419e2d20c1432ffe92d94ca070286021a8e/workflow-support-838.va_3a_087b_4055b.jar
Dependency Hierarchy:
- :x: workflow-support-838.va_3a_087b_4055b.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.
Publish Date: 2022-10-19
URL: CVE-2022-43409
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins.workflow:workflow-support:839.v35e2736cfd5c
- [ ] Check this box to open an automated fix PR