Miggo Logo

CVE-2022-41239: Stored XSS vulnerability in Jenkins DotCi Plugin

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.93384%
Published
9/22/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.groupon.jenkins-ci.plugins:DotCimaven<= 2.40.00

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped GitHub user names in build cause displays. Jenkins plugins typically use the getShortDescription() method in Cause subclasses to generate UI messages. Since the advisory explicitly states the user name isn't escaped during display, this method is the logical point where raw user input is incorporated into HTML without sanitization. The stored XSS occurs when this unescaped value is rendered in the UI. While the exact code isn't visible, this pattern matches Jenkins plugin architecture and the described vulnerability mechanism.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ot*i Plu*in *.**.** *n* **rli*r *o*s not *s**p* t** *it*u* us*r n*m* p*r*m*t*r provi*** to *ommit noti*i**tions w**n *ispl*yin* t**m in * *uil* **us*. T*is r*sults in * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xploit**l* *y *tt**k*rs **l* t

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** *it*u* us*r n*m*s in *uil* **us* *ispl*ys. J*nkins plu*ins typi**lly us* t** **tS*ort**s*ription() m*t*o* in **us* su**l*ss*s to **n*r*t* UI m*ss***s. Sin** t** **visory *xpli*itly st*t*s t** us*r n*m* isn't *s*