First published: Thu Oct 08 2020(Updated: )
Jenkins Active Choices Plugin 2.4 and earlier does not escape `List` and `Map` return values of sandboxed scripts for Reactive Reference Parameters. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. This issue is caused by an incomplete fix for [SECURITY-470](https://www.jenkins.io/security/advisory/2017-10-23/#persisted-cross-site-scripting-vulnerability-in-active-choices-plugin). Active Choices Plugin 2.5 escapes all legal return values of sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Choices | <=2.4 | |
maven/org.biouno:uno-choice | <2.5 | 2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2290 is classified as a medium severity vulnerability.
To fix CVE-2020-2290, update the Jenkins Active Choices Plugin to version 2.5 or later.
CVE-2020-2290 affects users of Jenkins with Job/Configure permission using Active Choices Plugin versions 2.4 and earlier.
CVE-2020-2290 is a stored cross-site scripting (XSS) vulnerability.
CVE-2020-2290 is caused by the failure to escape `List` and `Map` return values in sandboxed scripts for Reactive Reference Parameters.