CVE-2022-34777: Cross-site Scripting in Jenkins GitLab Plugin
8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.96477%
CWE
Published
7/1/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:gitlab-plugin | maven | <= 1.5.34 | 1.5.35 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped user-provided fields in webhook-triggered build descriptions. The patch modifies the Jelly template to stop displaying it.shortDescription
, replacing it with static text. The removed Jelly line '<j:out value="${it.shortDescription}"/>' directly references the getShortDescription()
method from GitLabWebHookCause
, which contained the unneutralized input. Since Jelly's escape-by-default wasn't sufficient (likely due to pre-HTML-encoded values from the cause object), this method represents the vulnerable data source in the runtime stack when rendering XSS payloads.