Stored Cross-Site Scripting Vulnerability in Jenkins Deployer Framework Plugin
CVE-2020-2227
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 15 July 2020
Summary
The Jenkins Deployer Framework Plugin prior to version 1.3 fails to properly escape URLs displayed on the build home page. This oversight permits attackers to inject payloads that can execute malicious scripts in the context of users accessing the affected page. Consequently, when a user interacts with the compromised URL, they might fall victim to unauthorized actions or data exfiltration, making it vital for users to upgrade to the latest version of the plugin for enhanced security.
Affected Version(s)
Jenkins Deployer Framework Plugin <= 1.2
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved