Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-1405 Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Github GHSA Github GHSA GHSA-chr6-386q-4m3v Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T05:25:32.336Z

Reserved: 2022-03-15T00:00:00

Link: CVE-2022-27200

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-15T17:15:10.433

Modified: 2024-11-21T06:55:23.817

Link: CVE-2022-27200

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses