![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Alert – Gafgyt aka Bashlite Malware – Active IOCs
January 26, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2022-46686 – Jenkins Custom Build Properties Plugin Vulnerability
January 26, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Alert – Gafgyt aka Bashlite Malware – Active IOCs
January 26, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2022-46686 – Jenkins Custom Build Properties Plugin Vulnerability
January 26, 2023Severity
High
Analysis Summary
CVE-2022-46687
Jenkins Spring Config Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the build display name. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
- Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2022-46687
Affected Vendors
Jenkins
Affected Products
- Jenkins Spring Config Plugin 2.0.0
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.