VYPR
Moderate severityNVD Advisory· Published Jan 12, 2022· Updated Aug 3, 2024

CVE-2022-23110

CVE-2022-23110

Description

Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:publish-over-sshMaven
< 1.231.23

Affected products

1

Patches

1
edf4e9816843

[SECURITY-2287] avoid xss storage for server name

1 file changed · +1 1
  • src/main/resources/jenkins/plugins/publish_over_ssh/BapSshPublisherPlugin/config.jelly+1 1 modified
    @@ -37,7 +37,7 @@
             <script type="text/javascript" src="${rootURL}/plugin/publish-over-ssh/js/pos.js" />
             <script type="text/javascript">
                 <j:forEach var="config" items="${descriptor.hostConfigurations}">
    -                exec_disabled['${config.name}'] = ${config.effectiveDisableExec};
    +                exec_disabled["${config.name}"] = ${config.effectiveDisableExec};
                 </j:forEach>
             </script>
         </st:once>
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.