Stored Cross-Site Scripting in Jenkins Matrix Project Plugin
CVE-2020-2225
5.4MEDIUM
Summary
The Jenkins Matrix Project Plugin versions before 1.16 are affected by a stored cross-site scripting vulnerability. This issue arises from the failure to properly escape axis names in tooltips displayed on the overview page for builds that utilize multiple axes. As a result, an attacker could potentially inject malicious scripts that execute within a user's context, compromising the security of the application and the users interacting with it.
Affected Version(s)
Jenkins Matrix Project Plugin <= 1.16
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved