First published: Wed Aug 12 2020(Updated: )
A flaw was found in Jenkins in versions prior to 2.251 and LTS 2.235.3. Tooltip values, which are not properly escaped, can be contributed by plugins and use user-specified values. This results in a potential stored cross-site scripting (XSS) vulnerability. This highest threat from this vulnerability is to data confidentiality and integrity.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.252 | 2.252 |
redhat/Jenkins-LTS | <2.235.4 | 2.235.4 |
redhat/jenkins | <0:2.235.5.1600415953-1.el7 | 0:2.235.5.1600415953-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.5.1600414805-1.el7 | 0:2.235.5.1600414805-1.el7 |
Jenkins Jenkins | <=2.235.3 | |
Jenkins Jenkins | <=2.251 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.236<=2.251 | 2.252 |
maven/org.jenkins-ci.main:jenkins-core | <=2.235.3 | 2.235.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2229 is a vulnerability found in Jenkins that allows for a stored cross-site scripting (XSS) attack.
The severity of CVE-2020-2229 is medium, with a CVSS score of 5.4.
CVE-2020-2229 affects Jenkins versions prior to 2.251 and LTS 2.235.3.
To fix CVE-2020-2229, update Jenkins to version 2.252 or higher, or LTS 2.235.4 or higher.
More information about CVE-2020-2229 can be found at the following references: [Link 1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1874831), [Link 2](https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1955), [Link 3](https://access.redhat.com/errata/RHSA-2020:3841)