logo

CVE-2020-2217 org.jenkins-ci.plugins:compatibility-action-storage

Package

Manager: maven
Name: org.jenkins-ci.plugins:compatibility-action-storage
Vulnerable Version: >=0 <=1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00359 pctl0.57367

Details

Reflected XSS in Jenkins Compatibility Action Storage Plugin Jenkins Compatibility Action Storage Plugin 1.0 and earlier does not escape the content coming from the MongoDB in the testConnection form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.

Metadata

Created: 2022-05-24T17:22:20Z
Modified: 2022-12-29T01:27:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rfrq-3v89-fqg6/GHSA-rfrq-3v89-fqg6.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-rfrq-3v89-fqg6
Finding: F008
Auto approve: 1