First published: Wed Jul 15 2020(Updated: )
A flaw was found in Jenkins versions 2.244 and prior and in LTS 2.235.1 and prior. The upstream job's display name is not escaped on build time trend pages which could lead to a stored cross-site scripting (XSS) vulnerability. The user must have the Agent/Configure permission for this exploit to function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2.245 | 2.245 |
redhat/jenkins | <0:2.235.2.1597220898-1.el7 | 0:2.235.2.1597220898-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.2.1597312065-1.el7 | 0:2.235.2.1597312065-1.el7 |
redhat/jenkins | <0:2.235.2.1597312414-1.el7 | 0:2.235.2.1597312414-1.el7 |
Jenkins Jenkins | <=2.235.1 | |
Jenkins Jenkins | <=2.244 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.236<=2.244 | 2.245 |
maven/org.jenkins-ci.main:jenkins-core | <=2.235.1 | 2.235.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2020-2221 is high with a severity value of 8.
CVE-2020-2221 affects Jenkins versions 2.244 and prior and LTS 2.235.1 and prior.
CVE-2020-2221 poses a risk of a stored cross-site scripting (XSS) vulnerability.
To fix CVE-2020-2221, upgrade to Jenkins version 2.245 or apply the appropriate security patch provided by Red Hat.
You can find more information about CVE-2020-2221 in the Jenkins Security Advisory and the Red Hat Security Advisory linked in the references.