Stored Cross-Site Scripting Vulnerability in Jenkins ECharts API Plugin
CVE-2020-2193

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
3 June 2020

Summary

The Jenkins ECharts API Plugin versions 4.7.0-3 and earlier contain a vulnerability that allows an attacker to execute stored cross-site scripting (XSS) attacks. This occurs because the plugin fails to properly escape the parser identifier when rendering charts, which can lead to malicious scripts being executed in the context of an administrator's session. This may compromise sensitive information or system integrity, making it essential for users to update to the latest version to mitigate this risk.

Affected Version(s)

Jenkins ECharts API Plugin <= 4.7.0-3

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.