CVE-2020-2225 – org.jenkins-ci.plugins:matrix-project
Package
Manager: maven
Name: org.jenkins-ci.plugins:matrix-project
Vulnerable Version: >=0 <1.17
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00312 pctl0.53767
Details
Stored XSS vulnerability in multiple axis builds tooltips in Jenkins Matrix Project Plugin Matrix Project Plugin 1.16 and earlier does not escape the axis names shown in tooltips on the overview page of builds with multiple axes. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission. Matrix Project Plugin 1.17 escapes the axis names shown in these tooltips.
Metadata
Created: 2022-05-24T17:23:39Z
Modified: 2022-12-27T23:02:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w43x-5f8f-686p/GHSA-w43x-5f8f-686p.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-w43x-5f8f-686p
Finding: F425
Auto approve: 1