
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-34176 is a stored cross-site scripting (XSS) vulnerability discovered in the Jenkins JUnit Plugin versions 1119.vaa5e9068da_d7 and earlier. The vulnerability was disclosed on June 22, 2022, affecting the Jenkins continuous integration/continuous deployment (CI/CD) platform. The issue specifically impacts the JUnit Plugin, which is used for displaying test results in Jenkins (Jenkins Advisory).
The vulnerability stems from the JUnit Plugin's failure to properly escape descriptions of test results. This implementation flaw creates a stored cross-site scripting vulnerability that can be exploited by attackers who have Run/Update permissions in Jenkins. The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (NVD).
The vulnerability allows attackers with Run/Update permission to inject malicious scripts through test result descriptions. When other users view these test results, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or other client-side attacks (Jenkins Advisory).
The vulnerability has been fixed in JUnit Plugin version 1119.1121.vc43d0fc45561. The fix applies the configured markup formatter to descriptions of test results, properly escaping potentially malicious content. Users are strongly advised to upgrade to this version or later to protect against this vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."