Reflected Cross-Site Scripting in Jenkins Subversion Plugin by CloudBees
CVE-2020-2199

6.1MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
3 June 2020

Summary

The Jenkins Subversion Partial Release Manager Plugin, up to version 1.0.1, has a security flaw that allows an attacker to execute a reflected cross-site scripting (XSS) attack. This vulnerability occurs because the plugin does not properly escape error messages in the repository URL field during form validation, enabling malicious scripts to be injected and executed in the context of the user's browser. This could potentially lead to unauthorized interactions with the Jenkins server, jeopardizing the integrity of sensitive data and user sessions.

Affected Version(s)

Jenkins Subversion Partial Release Manager Plugin <= 1.0.1

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.