Jenkins BART Plugin 1.0.3 and earlier does not escape the parsed content of build logs before rendering it on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability. Currently, there are no known workarounds or patches available.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-45387
- https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2802
- https://github.com/jenkins-infra/update-center2/pull/658
- https://github.com/jenkinsci/bart-plugin/blob/30d19e0ded8588c84601c7ffbcd0dd91c08ef945/src/main/java/org/jenkinsci/plugins/bart/LogParserBuildAction.java#L85
- https://github.com/advisories/GHSA-j923-26c2-qq9p