Stored Cross-Site Scripting Vulnerability in Jenkins Active Choices Plugin
CVE-2020-2290

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
8 October 2020

Summary

The Jenkins Active Choices Plugin, specifically versions 2.4 and earlier, contains a vulnerability that allows attackers to exploit stored cross-site scripting (XSS). This occurs due to the failure to properly escape certain return values from sandboxed scripts in Reactive Reference Parameters, enabling attackers with Job/Configure permission to execute malicious scripts. These actions can compromise user sessions and potentially lead to further exploitation within the Jenkins environment.

Affected Version(s)

Jenkins Active Choices Plugin <= 2.4

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.