Reflected Cross-Site Scripting in Jenkins Subversion Plugin by CloudBees
CVE-2020-2199
6.1MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 3 June 2020
Summary
The Jenkins Subversion Partial Release Manager Plugin, up to version 1.0.1, has a security flaw that allows an attacker to execute a reflected cross-site scripting (XSS) attack. This vulnerability occurs because the plugin does not properly escape error messages in the repository URL field during form validation, enabling malicious scripts to be injected and executed in the context of the user's browser. This could potentially lead to unauthorized interactions with the Jenkins server, jeopardizing the integrity of sensitive data and user sessions.
Affected Version(s)
Jenkins Subversion Partial Release Manager Plugin <= 1.0.1
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved