This repository has been archived by the owner on Oct 2, 2023. It is now read-only.
CVE-2022-43409 (Medium) detected in workflow-support-1.11.jar #176
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2022-43409 - Medium Severity Vulnerability
Vulnerable Library - workflow-support-1.11.jar
Library home page: https://wiki.jenkins-ci.org/display/JENKINS/Workflow+Plugin
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jenkins-ci/plugins/workflow/workflow-support/1.11/workflow-support-1.11.jar
Dependency Hierarchy:
Found in HEAD commit: 97ed2b7fe477b78f0b26191e5950825314db7b2c
Found in base branch: master
Vulnerability Details
Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.
Publish Date: 2022-10-19
URL: CVE-2022-43409
CVSS 3 Score Details (5.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins.workflow:workflow-support:839.v35e2736cfd5c
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: