First published: Wed Jun 03 2020(Updated: )
A vulnerability was found in Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability. Reference: <a href="http://www.openwall.com/lists/oss-security/2020/06/03/3">http://www.openwall.com/lists/oss-security/2020/06/03/3</a>
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins-script-security-plugin | <1.73 | 1.73 |
redhat/jenkins | <2-plugins-0:4.4.1598545590-1.el7 | 2-plugins-0:4.4.1598545590-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1595405982-1.el7 | 2-plugins-0:4.5.1595405982-1.el7 |
Jenkins Script Security | <=1.72 | |
maven/org.jenkins-ci.plugins:script-security | <=1.72 | 1.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-2190.
The title of this vulnerability is 'Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.'
The severity of CVE-2020-2190 is medium, with a CVSS score of 5.4.
This vulnerability affects Jenkins through the Script Security Plugin version 1.72 and earlier.
To fix CVE-2020-2190, update the Script Security Plugin to version 1.73 or later.