logo

CVE-2020-2137 org.jenkins-ci.plugins:timestamper

Package

Manager: maven
Name: org.jenkins-ci.plugins:timestamper
Vulnerable Version: >=0 <1.11.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00242 pctl0.47342

Details

Stored XSS vulnerability in Jenkins Timestamper Plugin Timestamper Plugin 1.11.1 and earlier does not escape or sanitize the HTML formatting used to display the timestamps in console output for builds. This results in a stored cross-site scripting vulnerability that can be exploited by users with Overall/Administer permission. Timestamper Plugin 1.11.2 sanitizes the HTML formatting for timestamps and only allows basic, safe HTML formatting.

Metadata

Created: 2022-05-24T17:10:27Z
Modified: 2023-01-05T20:18:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6xxf-rwv4-mrjm/GHSA-6xxf-rwv4-mrjm.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-6xxf-rwv4-mrjm
Finding: F425
Auto approve: 1