

Rewterz Threat Alert – Gootloader – Active IOCs
November 17, 2022
Rewterz Threat Alert – LockBit Ransomware – Active IOCs
November 17, 2022
Rewterz Threat Alert – Gootloader – Active IOCs
November 17, 2022
Rewterz Threat Alert – LockBit Ransomware – Active IOCs
November 17, 2022Severity
High
Analysis Summary
CVE-2022-45401
Jenkins Associated Files Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2022-45401
Affected Vendors
Jenkins
Affected Products
- Jenkins Associated Files Plugin 0.2.1
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.