Stored Cross-Site Scripting Vulnerability in Jenkins Git Parameter Plugin
CVE-2020-2113

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 February 2020

Summary

The Git Parameter Plugin for Jenkins, versions 0.9.11 and earlier, is vulnerable to stored cross-site scripting due to improper escaping of the default value displayed in the user interface. This vulnerability can be exploited by users who possess Job/Configure permissions, potentially allowing malicious scripts to be executed within the context of the affected application, leading to unauthorized actions or information disclosure.

Affected Version(s)

Jenkins Git Parameter Plugin 0.9.4

Jenkins Git Parameter Plugin <= 0.9.11

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.