First published: Wed Aug 12 2020(Updated: )
A flaw was found in Jenkins in versions prior to 2.251 and LTS 2.235.3. The project naming strategy description, displayed on item creation, is not properly escaped. This can result in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permissions. The highest threat from this vulnerability is to data confidentiality and integrity.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.235.5.1600415953-1.el7 | 0:2.235.5.1600415953-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.5.1600414805-1.el7 | 0:2.235.5.1600414805-1.el7 |
Jenkins Jenkins | <=2.235.3 | |
Jenkins Jenkins | <=2.251 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.236<=2.251 | 2.252 |
maven/org.jenkins-ci.main:jenkins-core | <=2.235.3 | 2.235.4 |
redhat/Jenkins | <2.252 | 2.252 |
redhat/Jenkins-LTS | <2.235.4 | 2.235.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2230 is classified as a medium severity stored cross-site scripting vulnerability.
CVE-2020-2230 affects Jenkins versions prior to 2.251 and LTS 2.235.3.
To fix CVE-2020-2230, upgrade Jenkins to version 2.252 or later, or LTS version 2.235.4 or later.
Attackers with Overall/Manage permissions can exploit CVE-2020-2230 to execute malicious scripts in users' browsers.
Yes, CVE-2020-2230 is specifically a stored cross-site scripting (XSS) vulnerability.