Moderate severityNVD Advisory· Published Jan 12, 2022· Updated Aug 3, 2024
CVE-2022-23110
CVE-2022-23110
Description
Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:publish-over-sshMaven | < 1.23 | 1.23 |
Affected products
1- Range: unspecified
Patches
1edf4e9816843[SECURITY-2287] avoid xss storage for server name
1 file changed · +1 −1
src/main/resources/jenkins/plugins/publish_over_ssh/BapSshPublisherPlugin/config.jelly+1 −1 modified@@ -37,7 +37,7 @@ <script type="text/javascript" src="${rootURL}/plugin/publish-over-ssh/js/pos.js" /> <script type="text/javascript"> <j:forEach var="config" items="${descriptor.hostConfigurations}"> - exec_disabled['${config.name}'] = ${config.effectiveDisableExec}; + exec_disabled["${config.name}"] = ${config.effectiveDisableExec}; </j:forEach> </script> </st:once>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-fjpm-hf7c-xgc2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-23110ghsaADVISORY
- www.openwall.com/lists/oss-security/2022/01/12/6ghsamailing-listx_refsource_MLISTWEB
- github.com/jenkinsci/publish-over-ssh-plugin/commit/edf4e981684326d371200541d440d26b141b269eghsaWEB
- github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23ghsaWEB
- www.jenkins.io/security/advisory/2022-01-12/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.