opensearch-build icon indicating copy to clipboard operation
opensearch-build copied to clipboard

CVE-2022-43409 (Medium) detected in workflow-support-838.va_3a_087b_4055b.jar

Open mend-for-github-com[bot] opened this issue 3 years ago • 3 comments

CVE-2022-43409 - Medium Severity Vulnerability

Vulnerable Library - workflow-support-838.va_3a_087b_4055b.jar

The Jenkins Plugins Parent POM Project

Library home page: https://github.com/jenkinsci/workflow-support-plugin

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins.workflow/workflow-support/838.va_3a_087b_4055b/88ac7419e2d20c1432ffe92d94ca070286021a8e/workflow-support-838.va_3a_087b_4055b.jar

Dependency Hierarchy:

  • :x: workflow-support-838.va_3a_087b_4055b.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.

Publish Date: 2022-10-19

URL: CVE-2022-43409

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881

Release Date: 2022-10-19

Fix Resolution: org.jenkins-ci.plugins.workflow:workflow-support:839.v35e2736cfd5c


  • [ ] Check this box to open an automated fix PR