Miggo Logo

CVE-2022-30967: Cross site scripting in Jenkins Selection tasks Plugin

8

CVSS Score
3.1

Basic Information

EPSS Score
0.96652%
Published
5/18/2022
Updated
1/28/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jvnet.hudson.plugins:selection-tasks-pluginmaven<= 1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped parameter names/descriptions in views. Jenkins plugins typically use Jelly templates for rendering UI components. The pattern matches known XSS vulnerabilities in Jenkins where parameter metadata is rendered without proper escaping. The advisory specifically identifies Script Selection task variable parameters as vulnerable, implying the rendering logic for these parameters in their Jelly templates (config.jelly) lacks output encoding. While exact code isn't available, this is the standard implementation pattern for Jenkins parameter types, and the vulnerability description directly maps to missing escape calls in these template rendering functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins S*l**tion t*sks Plu*in *.* *n* **rli*r *o*s not *s**p* t** n*m* *n* **s*ription o* S*ript S*l**tion t*sk v*ri**l* p*r*m*t*rs on vi*ws *ispl*yin* p*r*m*t*rs. T*is r*sults in stor** *ross-sit* s*riptin* (XSS) vuln*r**iliti*s *xploit**l* *y *tt*

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** p*r*m*t*r n*m*s/**s*riptions in vi*ws. J*nkins plu*ins typi**lly us* J*lly t*mpl*t*s *or r*n**rin* UI *ompon*nts. T** p*tt*rn m*t***s known XSS vuln*r**iliti*s in J*nkins w**r* p*r*m*t*r m*t***t* is r*n**r** wit