Description
Jenkins Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view, resulting in a stored XSS vulnerability exploitable by users able to change job configurations.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5780 | Jenkins Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view, resulting in a stored XSS vulnerability exploitable by users able to change job configurations. |
Github GHSA |
GHSA-xg77-xqhq-crpr | Stored XSS vulnerability in Code Coverage API Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T07:01:39.703Z
Reserved: 2019-12-05T00:00:00.000Z
Link: CVE-2020-2106
No data.
Status : Modified
Published: 2020-01-29T16:15:12.630
Modified: 2024-11-21T05:24:39.107
Link: CVE-2020-2106
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA