Stored Cross-Site Scripting in Jenkins VncRecorder Plugin
CVE-2020-2205
4.8MEDIUM
Summary
The VncRecorder Plugin for Jenkins, specifically versions 1.25 and earlier, contains a vulnerability where the checkVncServ
form validation endpoint fails to properly escape a tool path input. This flaw allows for stored cross-site scripting (XSS) attacks, which could be exploited by Jenkins administrators if they interact with the compromised input, potentially leading to unauthorized actions or data access. Administrators are advised to update to the latest version to mitigate this risk.
Affected Version(s)
Jenkins VncRecorder Plugin <= 1.25
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved