Miggo Logo

CVE-2022-41229: Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Cross-site Scripting

8

CVSS Score
3.1

Basic Information

EPSS Score
0.86387%
Published
9/22/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.jenkins.plugins:cavisson-ns-nd-integrationmaven< 4.8.0.1474.8.0.147

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises from improper escaping of configuration options in the Execute NetStorm/NetCloud Test build step. The identified functions are form validation handlers (annotated with @POST) that process user-supplied parameters (e.g., URLs, usernames) and return responses. Prior to the patch, these methods did not sanitize inputs, allowing attackers to inject malicious scripts. The commit diff shows changes to parameter handling and SSL configurations, but the root cause lies in the lack of escaping when rendering these parameters in the Jenkins UI. The high confidence stems from the direct link between these functions and the user-controlled configuration options described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins NS-N* Int**r*tion P*r*orm*n** Pu*lis**r Plu*in prior to v*rsion *.*.*.*** *o*s not *s**p* *on*i*ur*tion options o* t** *x**ut* N*tStorm/N*t*lou* T*st *uil* st*p, r*sultin* in * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xploit**l* *y *t

Reasoning

T** vuln*r**ility *ris*s *rom improp*r *s**pin* o* `*on*i*ur*tion` options in t** `*x**ut*` `N*tStorm/N*t*lou*` `T*st` *uil* st*p. T** i**nti*i** `*un*tions` *r* `*orm` `v*li**tion` **n*l*rs (*nnot*t** wit* `@POST`) t**t `pro**ss` us*r-suppli** p*r*m