First published: Wed Jul 15 2020(Updated: )
A flaw was found in the Matrix Project Plugin version 1.16 and prior. Node names shown in tooltips are not escaped on the overview page of builds with multiple axes which could lead to a stored cross-site scripting (XSS) vulnerability. The user must have the Agent/Configure permission for this exploit to function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1597310986-1.el7 | 2-plugins-0:3.11.1597310986-1.el7 |
redhat/jenkins | <2-plugins-0:4.3.1601981312-1.el7 | 2-plugins-0:4.3.1601981312-1.el7 |
redhat/jenkins | <2-plugins-0:4.4.1598545590-1.el7 | 2-plugins-0:4.4.1598545590-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1596698303-1.el7 | 2-plugins-0:4.5.1596698303-1.el7 |
maven/org.jenkins-ci.plugins:matrix-project | <=1.16 | 1.17 |
redhat/matrix-project | <1.17 | 1.17 |
Jenkins Matrix Project Jenkins | <=1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw in Jenkins Matrix Project Plugin is CVE-2020-2225.
The severity of CVE-2020-2225 is high with a severity value of 8.
This vulnerability occurs when node names shown in tooltips are not escaped on the overview page of builds with multiple axes, leading to a stored cross-site scripting (XSS) vulnerability.
Jenkins Matrix Project Plugin version 1.16 and earlier are affected by this vulnerability.
To fix the vulnerability, update Jenkins Matrix Project Plugin to version 1.17 or later.