Exploitable Stored XSS in Jenkins Code Coverage API Plugin
CVE-2020-2106
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 29 January 2020
Summary
The Jenkins Code Coverage API Plugin prior to version 1.1.3 is susceptible to a stored Cross-Site Scripting vulnerability. This issue arises because the plugin does not properly escape the filename of the coverage report displayed in its interface. This oversight allows authenticated users with the capability to modify job configurations to execute arbitrary JavaScript in the context of the user's web browser. Successful exploitation of this vulnerability could lead to session hijacking, data theft, or further network compromise.
Affected Version(s)
Jenkins Code Coverage API Plugin <= 1.1.2
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved