CVE-2022-27212: Stored Cross-site Scripting vulnerability in Jenkins List Git Branches Parameter Plugin
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.96573%
CWE
Published
3/16/2022
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:list-git-branches-parameter | maven | <= 0.0.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key factors: 1) The plugin fails to escape the parameter name during rendering, and 2) It explicitly disables Jenkins' security mechanism (introduced in 2.44/LTS 2.32.2) that would normally prevent XSS via unescaped parameters. The isAutoEscaped()
method's override to return false is explicitly mentioned in the advisory as the mechanism bypass. While the exact view template rendering the parameter name would also be involved, the root cause is the disabled escaping mechanism controlled by this method. The confidence is high because the advisory specifically calls out this security mechanism bypass.