
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-30967 is a stored cross-site scripting (XSS) vulnerability affecting the Selection tasks Plugin version 1.0 and earlier in Jenkins. The vulnerability was disclosed on May 17, 2022, as part of a larger Jenkins security advisory. The issue specifically affects the parameter types provided by the plugin (Jenkins Advisory).
The vulnerability exists because the Selection tasks Plugin does not properly escape the name and description of the parameter types it provides. This results in a stored cross-site scripting (XSS) vulnerability that can be exploited by attackers who have Item/Configure permission. The vulnerability is tracked as SECURITY-2728 and has been assigned a High severity CVSS rating (Jenkins Advisory).
The vulnerability allows attackers with Item/Configure permission to execute stored cross-site scripting (XSS) attacks. Exploitation requires that parameters are listed on pages like 'Build With Parameters' and 'Parameters' pages provided by Jenkins core, and that those pages are not hardened to prevent exploitation (Jenkins Advisory).
As of the advisory publication on May 17, 2022, there was no fix available for the Selection tasks Plugin 1.0 and earlier. Users are advised to monitor for updates and implement general Jenkins security best practices until a patch becomes available (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."