logo

CVE-2020-2175 org.jenkins-ci.plugins:fitnesse

Package

Manager: maven
Name: org.jenkins-ci.plugins:fitnesse
Vulnerable Version: >=0 <1.32

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00156 pctl0.36906

Details

Stored XSS vulnerability in Jenkins FitNesse Plugin Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin. Jenkins FitNesse Plugin 1.32 escapes content from XML input files before rendering it on the Jenkins UI.

Metadata

Created: 2022-05-24T17:13:39Z
Modified: 2023-12-14T10:20:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-f6vx-3fq6-hxm8/GHSA-f6vx-3fq6-hxm8.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-f6vx-3fq6-hxm8
Finding: F425
Auto approve: 1