Stored XSS Vulnerability in Jenkins RapidDeploy Plugin by Jenkins
CVE-2020-2170
5.4MEDIUM
Summary
The Jenkins RapidDeploy Plugin prior to version 4.2 is susceptible to stored Cross-Site Scripting (XSS) attacks. This vulnerability arises because the plugin fails to properly escape package names retrieved from a remote server. An attacker can exploit this flaw to inject malicious scripts that are stored and later executed in the context of another user's session, potentially leading to unauthorized actions and data exposure.
Affected Version(s)
Jenkins RapidDeploy Plugin <= 4.2
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved