First published: Wed Sep 16 2020(Updated: )
Jenkins Pipeline Maven Integration Plugin 3.9.2 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Pipeline Maven Integration | <=3.9.2 | |
maven/org.jenkins-ci.plugins:pipeline-maven | <=3.9.2 | 3.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Jenkins Pipeline Maven Integration Plugin is CVE-2020-2256.
The severity of CVE-2020-2256 is medium with a severity value of 5.4.
The affected software for CVE-2020-2256 is Jenkins Pipeline Maven Integration Plugin version up to and including 3.9.2.
CVE-2020-2256 is a stored cross-site scripting (XSS) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.9.2 and earlier, allowing attackers with Job/Configure permission to exploit the vulnerability.
Yes, you can find references for CVE-2020-2256 at the following links: [reference 1](http://www.openwall.com/lists/oss-security/2020/09/16/3) and [reference 2](https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1976).