logo

CVE-2020-2238 org.jenkins-ci.tools:git-parameter

Package

Manager: maven
Name: org.jenkins-ci.tools:git-parameter
Vulnerable Version: >=0 <0.9.13

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00233 pctl0.4603

Details

Stored XSS vulnerability in Jenkins Git Parameter Plugin Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Git Parameter Plugin 0.9.13 escapes the repository field on the 'Build with Parameters' page.

Metadata

Created: 2022-05-24T17:27:06Z
Modified: 2022-12-21T00:22:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-j7q2-c6r4-x2jw/GHSA-j7q2-c6r4-x2jw.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-j7q2-c6r4-x2jw
Finding: F425
Auto approve: 1