Stored Cross-Site Scripting Vulnerability in Jenkins Active Choices Plugin
CVE-2020-2290
5.4MEDIUM
Summary
The Jenkins Active Choices Plugin, specifically versions 2.4 and earlier, contains a vulnerability that allows attackers to exploit stored cross-site scripting (XSS). This occurs due to the failure to properly escape certain return values from sandboxed scripts in Reactive Reference Parameters, enabling attackers with Job/Configure permission to execute malicious scripts. These actions can compromise user sessions and potentially lead to further exploitation within the Jenkins environment.
Affected Version(s)
Jenkins Active Choices Plugin <= 2.4
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved