CVE-2022-45387: Jenkins BART Plugin vulnerable to cross-site scripting (XSS)
(updated )
Jenkins BART Plugin 1.0.3 and earlier does not escape the parsed content of build logs before rendering it on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability. Currently, there are no known workarounds or patches available.
References
- github.com/advisories/GHSA-j923-26c2-qq9p
- github.com/jenkins-infra/update-center2/pull/658
- github.com/jenkinsci/bart-plugin
- github.com/jenkinsci/bart-plugin/blob/30d19e0ded8588c84601c7ffbcd0dd91c08ef945/src/main/java/org/jenkinsci/plugins/bart/LogParserBuildAction.java
- nvd.nist.gov/vuln/detail/CVE-2022-45387
- www.jenkins.io/security/advisory/2022-11-15/
Code Behaviors & Features
Detect and mitigate CVE-2022-45387 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →