Moderate severityNVD Advisory· Published Jan 15, 2020· Updated Aug 4, 2024
CVE-2020-2096
CVE-2020-2096
Description
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.ruby-plugins:gitlab-hookMaven | <= 1.4.2 | — |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-8696-836p-c8qpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-2096ghsaADVISORY
- packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.htmlghsax_refsource_MISCWEB
- www.openwall.com/lists/oss-security/2020/01/15/1ghsamailing-listx_refsource_MLISTWEB
- jenkins.io/security/advisory/2020-01-15/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.