Stored Cross-Site Scripting in Jenkins Matrix Project Plugin
CVE-2020-2224
5.4MEDIUM
Summary
The Jenkins Matrix Project Plugin prior to version 1.17 is susceptible to a stored cross-site scripting vulnerability due to improper escaping of node names in tooltips displayed on build overview pages for single axis projects. This allows an attacker to inject malicious scripts that may execute in the context of user sessions, potentially compromising sensitive information or performing unauthorized actions within the Jenkins interface.
Affected Version(s)
Jenkins Matrix Project Plugin <= 1.16
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved