First published: Wed Aug 12 2020(Updated: )
A flaw was found in Jenkins versions prior to 2.251 and LTS 2.235.3. The remote address of hosts starting a build via 'Trigger builds remotely' are not properly escaped leading to a potential stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the authentication token. The highest threat from this vulnerability is to data confidentiality and integrity.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.235.5.1600415953-1.el7 | 0:2.235.5.1600415953-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.5.1600414805-1.el7 | 0:2.235.5.1600414805-1.el7 |
maven/org.jenkins-ci.main:jenkins-core | >=2.237<=2.251 | 2.252 |
maven/org.jenkins-ci.main:jenkins-core | <=2.235.3 | 2.235.4 |
redhat/Jenkins | <2.252 | 2.252 |
redhat/Jenkins-LTS | <2.235.4 | 2.235.4 |
Jenkins | <=2.235.3 | |
Jenkins | <=2.251 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2231 has a medium severity rating and poses a stored cross-site scripting (XSS) vulnerability.
To fix CVE-2020-2231, upgrade to Jenkins version 2.252 or LTS version 2.235.4 or later.
CVE-2020-2231 affects Jenkins versions prior to 2.251 and LTS version 2.235.3.
Exploitation of CVE-2020-2231 can allow unauthorized users with Job/Configure permissions to execute arbitrary JavaScript in the context of the web application.
CVE-2020-2231 can be exploited by users with certain permissions, making it a risk if proper access controls are not in place.