Miggo Logo

CVE-2022-29046: Stored Cross-site Scripting vulnerability in Jenkins Subversion Plugin

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.79105%
Published
4/13/2022
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:subversionmaven< 2.15.42.15.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped parameter names/descriptions in UI rendering. Jenkins plugins typically use Jelly templates for views, and XSS vulnerabilities in parameter handling are commonly found in these templates. The advisory specifically calls out parameter display pages as the attack vector, implicating the view layer components. While exact file paths aren't available in disclosures, the pattern matches Jenkins plugin architecture where:

  1. Jelly templates in src/main/resources handle HTML rendering
  2. Parameter definition classes in src/main/java manage parameter metadata High confidence in Jelly templates being vulnerable due to the XSS nature; medium confidence in Java methods due to potential data flow involvement.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins Su*v*rsion Plu*in *.**.* *n* **rli*r *o*s not *s**p* t** n*m* *n* **s*ription o* List Su*v*rsion t**s (*n* mor*) p*r*m*t*rs on vi*ws *ispl*yin* p*r*m*t*rs, r*sultin* in * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xploit**l* *y *tt**k*r

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** p*r*m*t*r n*m*s/**s*riptions in UI r*n**rin*. J*nkins plu*ins typi**lly us* J*lly t*mpl*t*s *or vi*ws, *n* XSS vuln*r**iliti*s in p*r*m*t*r **n*lin* *r* *ommonly *oun* in t**s* t*mpl*t*s. T** **visory sp**i*i**l