Miggo Logo

CVE-2022-46684:
Stored XSS vulnerability in Jenkins Checkmarx Plugin

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
12/12/2022
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.checkmarx.jenkins:checkmarxmaven<= 2022.3.32022.4.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information indicates that the Checkmarx Plugin failed to escape API response values before inserting them into HTML reports. However, the advisory and references do not include specific code snippets, commit diffs, or file paths that would allow precise identification of the vulnerable functions. While the vulnerability clearly stems from missing output encoding during HTML report generation, the lack of access to the plugin's source code or patch details makes it impossible to pinpoint exact function names and file paths with high confidence. High-confidence identification requires direct evidence from code changes or technical documentation, which is not available here.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

***km*rx Plu*in pro**ss*s ****km*rx s*rvi** *PI r*spons*s *n* **n*r*t*s *TML r*ports *rom t**m *or r*n**rin* on t** J*nkins UI. ****km*rx Plu*in ****.*.* *n* **rli*r *o*s not *s**p* v*lu*s r*turn** *rom t** ****km*rx s*rvi** *PI ***or* ins*rtin* t**

Reasoning

T** provi*** vuln*r**ility in*orm*tion in*i**t*s t**t t** ****km*rx Plu*in **il** to *s**p* *PI r*spons* v*lu*s ***or* ins*rtin* t**m into *TML r*ports. *ow*v*r, t** **visory *n* r***r*n**s *o not in*lu** sp**i*i* *o** snipp*ts, *ommit *i**s, or *il*