
Cloud Vulnerability DB
A community-led vulnerabilities database
Jenkins Filesystem List Parameter Plugin version 0.0.7 and earlier contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2022-34187. The vulnerability was discovered in June 2022 and affects the plugin's handling of File system objects list parameters (Jenkins Advisory, NVD).
The vulnerability exists because the plugin does not escape the name and description of File system objects list parameters on views displaying parameters. This security flaw is part of a broader set of similar vulnerabilities found in multiple Jenkins plugins that provide additional parameter types. The vulnerability has been assigned a High severity rating (Jenkins Advisory).
The vulnerability results in a stored cross-site scripting (XSS) vulnerability that can be exploited by attackers who have Item/Configure permission. Successful exploitation could allow attackers to execute arbitrary web scripts or HTML in the context of other users' browsers when they view pages containing the affected parameters (Jenkins Advisory).
As of the advisory publication date, there was no fix available for the Filesystem List Parameter Plugin version 0.0.7 and earlier. Users should monitor for updates and implement them when available. The vulnerability can be partially mitigated by restricting Item/Configure permissions to trusted users (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."