
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-28133 is a high-severity vulnerability discovered in the Jenkins Bitbucket Server Integration Plugin versions 2.0.0 through 3.1.0. The vulnerability was disclosed on March 29, 2022, affecting the plugin's OAuth consumer callback URL functionality. This security flaw was identified as SECURITY-2639 in the Jenkins security advisory system (Jenkins Advisory).
The vulnerability stems from the plugin's failure to limit URL schemes for callback URLs on OAuth consumers. This implementation flaw specifically allows the usage of javascript: URL schemes in OAuth consumer callbacks, which creates a stored cross-site scripting (XSS) vulnerability. The severity is rated as High according to the CVSS scoring system (Jenkins Advisory).
The vulnerability enables a stored cross-site scripting (XSS) attack that can be exploited by attackers who have the ability to create BitBucket Server consumers. This could potentially lead to unauthorized access and execution of malicious JavaScript code in the context of other users' browsers (Jenkins Advisory).
The vulnerability has been patched in Bitbucket Server Integration Plugin version 3.2.0. The fix implements restrictions on allowed URL schemes to prevent the creation of consumers with javascript: URL schemes. Users are strongly advised to upgrade to this version to mitigate the security risk (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."