Stored Cross-Site Scripting Vulnerability in Jenkins Active Choices Plugin
CVE-2020-2289

5.4MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
8 October 2020

What is CVE-2020-2289?

The Active Choices Plugin in Jenkins, version 2.4 and earlier, contains a stored cross-site scripting vulnerability due to improper escaping of the name and description of build parameters. This flaw can be exploited by attackers who possess Job/Configure permissions, allowing them to execute arbitrary JavaScript in the context of other users' sessions. This could lead to unauthorized actions or the exposure of sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Active Choices Plugin 2.1

Jenkins Active Choices Plugin <= 2.4

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.