First published: Wed Mar 25 2020(Updated: )
Jenkins RapidDeploy Plugin 4.2 and earlier does not escape package names in the table of packages obtained from a remote server, resulting in a stored XSS vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Rapiddeploy | <=4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2170 is classified as a medium severity vulnerability due to the potential for stored Cross-Site Scripting (XSS).
To fix CVE-2020-2170, upgrade the Jenkins RapidDeploy Plugin to version 4.3 or later, which addresses the XSS issue.
CVE-2020-2170 can lead to stored XSS attacks, allowing attackers to inject malicious scripts into web pages viewed by other users.
CVE-2020-2170 affects Jenkins RapidDeploy Plugin versions 4.2 and earlier.
Yes, user interaction is typically required for the exploitation of CVE-2020-2170 to trigger the stored XSS.