HTTP: Jenkins Matrix Project Plugin Stored Cross-Site Scripting

This signature detects attempts to exploit a known cross-site scripting vulnerability against Jenkins Matrix Project Plugin. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.

Extended Description

Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.

Affected Products

Oracle communications_cloud_native_core_automated_test_suite

Short Name
HTTP:XSS:JNKNS-MATRX-PRJCT-PLGN
Severity
Warning
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2022-20615 Cross-Site Jenkins Matrix Plugin Project Scripting Stored
Release Date
02/07/2022
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Oracle

Jenkins

CVSS Score

3.5

Found a potential security threat?