logo

CVE-2020-2224 org.jenkins-ci.plugins:matrix-project

Package

Manager: maven
Name: org.jenkins-ci.plugins:matrix-project
Vulnerable Version: >=0 <1.17

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00296 pctl0.52471

Details

Stored XSS vulnerability in single axis builds tooltips in Jenkins Matrix Project Plugin Matrix Project Plugin 1.16 and earlier does not escape node names shown in tooltips on the overview page of builds with a single axis. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Agent/Configure permission. Matrix Project Plugin 1.17 escapes the node names shown in these tooltips.

Metadata

Created: 2022-05-24T17:23:38Z
Modified: 2022-12-27T23:01:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h6qc-455m-7v6v/GHSA-h6qc-455m-7v6v.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-h6qc-455m-7v6v
Finding: F425
Auto approve: 1