312
VMScore

CVE-2020-2112

Published: 12/02/2020 Updated: 25/10/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

Jenkins Git Parameter Plugin 0.9.11 and previous versions does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins git parameter

Mailing Lists

Jenkins is an open source automation server which enables developers around the world to reliably build, test, and deploy their software The following releases contain fixes for security vulnerabilities: * Azure AD Plugin 120 * Brakeman Plugin 013 * FitNesse Plugin 131 * Git Parameter Plugin 0912 * Google Kubernetes Engine Plugin 081 * N ...