CVE-2022-27200: Stored Cross-site Scripting in folder-auth plugin
(updated )
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.
See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
References
- github.com/advisories/GHSA-5vjc-qx43-r747
- github.com/jenkinsci/folder-auth-plugin
- github.com/jenkinsci/folder-auth-plugin/commit/085df580c22902820ebba77b1201fabff098efc4
- github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747
- nvd.nist.gov/vuln/detail/CVE-2022-27200
- www.jenkins.io/security/advisory/2022-03-15/
Code Behaviors & Features
Detect and mitigate CVE-2022-27200 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →