First published: Wed Jan 29 2020(Updated: )
Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view. This results in a stored cross-site scripting vulnerability that can be exploited by users able to change the job configuration. Code Coverage API Plugin 1.1.3 escapes the filename of the coverage report used in its view.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:code-coverage-api | <=1.1.2 | 1.1.3 |
Jenkins Code Coverage Api | <=1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2106 is classified as a medium severity vulnerability due to its potential for stored cross-site scripting.
To fix CVE-2020-2106, upgrade the Code Coverage API Plugin to version 1.1.3 or later.
CVE-2020-2106 affects versions of the Code Coverage API Plugin prior to 1.1.3.
CVE-2020-2106 is a stored cross-site scripting (XSS) vulnerability.
Users with the ability to change job configurations in Jenkins are at risk from CVE-2020-2106.