First published: Tue Sep 01 2020(Updated: )
Jenkins JSGames Plugin 0.2 and earlier evaluates part of a URL as code, resulting in a reflected cross-site scripting (XSS) vulnerability.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2248 is classified as a high severity vulnerability due to its potential for reflected cross-site scripting (XSS).
To fix CVE-2020-2248, upgrade the JSGames Plugin to version 0.3 or later, as earlier versions are vulnerable to this XSS issue.
Jenkins JSGames Plugin versions 0.2 and earlier are vulnerable to CVE-2020-2248.
The impact of CVE-2020-2248 allows an attacker to inject malicious code that could execute in the context of a user's browser.
CVE-2020-2248 occurs when the JSGames Plugin evaluates part of a URL as code, leading to a reflected cross-site scripting vulnerability.