Stored Cross-Site Scripting Vulnerability in Jenkins Git Parameter Plugin
CVE-2020-2113
5.4MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 12 February 2020
What is CVE-2020-2113?
The Git Parameter Plugin for Jenkins, versions 0.9.11 and earlier, is vulnerable to stored cross-site scripting due to improper escaping of the default value displayed in the user interface. This vulnerability can be exploited by users who possess Job/Configure permissions, potentially allowing malicious scripts to be executed within the context of the affected application, leading to unauthorized actions or information disclosure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Git Parameter Plugin 0.9.4
Jenkins Git Parameter Plugin <= 0.9.11
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved