First published: Thu Oct 08 2020(Updated: )
Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Choices | <=2.4 | |
maven/org.biouno:uno-choice | <2.5 | 2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2289 is a vulnerability in Jenkins Active Choices Plugin 2.4 and earlier that allows stored cross-site scripting (XSS) attacks.
The severity of CVE-2020-2289 is medium with a CVSS score of 5.4.
CVE-2020-2289 affects Jenkins Active Choices Plugin 2.4 and earlier versions by not properly escaping the name and description of build parameters, allowing for potential XSS attacks.
CVE-2020-2289 can be exploited by attackers with Job/Configure permission who can inject malicious code through the unescaped build parameter names and descriptions.
Yes, Active Choices Plugin 2.5 has been released, which addresses the vulnerability by properly escaping the name of build parameters.