First published: Wed Jul 15 2020(Updated: )
Deployer Framework Plugin is a framework plugin allowing other plugins to provide a way to deploy artifacts. Deployer Framework Plugin 1.2 and earlier does not escape the URL displayed in the build home page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to provide the location. The exploitability of this vulnerability depends on the specific implementation using Deployer Framework Plugin. The Jenkins security team is not aware of any exploitable implementation. Deployer Framework Plugin 1.3 escapes the URL.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Deployer Framework | <=1.2 | |
maven/org.jenkins-ci.plugins:deployer-framework | <=1.2 | 1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2227 is a medium severity stored cross-site scripting (XSS) vulnerability.
To fix CVE-2020-2227, upgrade the Deployer Framework Plugin to version 1.3 or later.
CVE-2020-2227 is caused by the Deployer Framework Plugin not escaping URLs displayed on the build home page.
CVE-2020-2227 affects users of Jenkins with Deployer Framework Plugin versions 1.2 and earlier.
Yes, CVE-2020-2227 can be exploited by users who can access the build home page, making it a potential remote attack vector.