Miggo Logo

CVE-2022-34195: Cross-site Scripting in Jenkins Repository Connector Plugin

8

CVSS Score
3.1

Basic Information

EPSS Score
0.94883%
Published
6/24/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:repository-connectormaven<= 2.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper output encoding in parameter display views. Jenkins plugins typically use Jelly templates to render parameter interfaces. The advisory explicitly states the plugin fails to escape name/description attributes, which would be handled in these view templates. While specific file names aren't provided, the pattern matches Jenkins' standard parameter implementation structure where parameter definitions have associated Jelly views in their package directory. The confidence is high because this is a well-established XSS pattern in Jenkins plugins and the advisory directly identifies the vulnerable attributes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins R*pository *onn**tor Plu*in *.*.* *n* **rli*r *o*s not *s**p* t** n*m* *n* **s*ription o* M*v*n R*pository *rti***t p*r*m*t*rs on vi*ws *ispl*yin* p*r*m*t*rs, r*sultin* in * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xploit**l* *y *tt**

Reasoning

T** vuln*r**ility st*ms *rom improp*r output *n*o*in* in p*r*m*t*r *ispl*y vi*ws. J*nkins plu*ins typi**lly us* J*lly t*mpl*t*s to r*n**r p*r*m*t*r int*r****s. T** **visory *xpli*itly st*t*s t** plu*in **ils to *s**p* n*m*/**s*ription *ttri*ut*s, w*i