Cross-site Scripting (XSS) Affecting jenkins package, versions <2.346.2-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE321-JENKINS-8486771
  • published6 Dec 2024
  • disclosed23 Jun 2022

Introduced: 23 Jun 2022

CVE-2022-34171  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 jenkins to version 2.346.2-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jenkins package and not the jenkins package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability.

CVSS Scores

version 3.1