First published: Wed Jul 15 2020(Updated: )
A flaw was found in Jenkins versions 2.244 and prior and in LTS 2.235.1 and prior. The agent name is not escaped on build time trend pages which could lead to a stored cross-site scripting (XSS) vulnerability. The user must have the Agent/Configure permission for this exploit to function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2.245 | 2.245 |
redhat/jenkins | <0:2.235.2.1597220898-1.el7 | 0:2.235.2.1597220898-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.2.1597312065-1.el7 | 0:2.235.2.1597312065-1.el7 |
redhat/jenkins | <0:2.235.2.1597312414-1.el7 | 0:2.235.2.1597312414-1.el7 |
Jenkins Jenkins | <=2.235.1 | |
Jenkins Jenkins | <=2.244 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.236<=2.244 | 2.245 |
maven/org.jenkins-ci.main:jenkins-core | <=2.235.1 | 2.235.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this vulnerability is CVE-2020-2220.
The severity of CVE-2020-2220 is high.
CVE-2020-2220 occurs when the agent name is not properly escaped on build time trend pages in Jenkins.
CVE-2020-2220 can lead to a stored cross-site scripting (XSS) vulnerability.
To fix CVE-2020-2220, update Jenkins to version 2.245 or later.