{
  "threat_severity" : "Moderate",
  "public_date" : "2022-06-22T00:00:00Z",
  "bugzilla" : {
    "description" : "Jenkins: Cross-site scripting (XSS) vulnerability in Jenkins LTS",
    "id" : "2119649",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2119649"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-79",
  "details" : [ "In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability." ],
  "statement" : "This vulnerability affects the Jenkins version 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive). Red Hat products use Jenkins version 2.319 which is NOT affected by this vulnerability.",
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-34171\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-34171\nhttps://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781" ],
  "name" : "CVE-2022-34171",
  "csaw" : false
}