Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T06:10:58.714Z
Reserved: 2022-04-11T00:00:00
Link: CVE-2022-29041

No data.

Status : Modified
Published: 2022-04-12T20:15:09.327
Modified: 2024-11-21T06:58:23.580
Link: CVE-2022-29041
