Moderate severityNVD Advisory· Published Jun 3, 2020· Updated Aug 4, 2024
CVE-2020-2193
CVE-2020-2193
Description
Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the parser identifier when rendering charts, resulting in a stored cross-site scripting vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.jenkins.plugins:echarts-apiMaven | < 4.7.0-4 | 4.7.0-4 |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-x9rq-9h44-f84vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-2193ghsaADVISORY
- www.openwall.com/lists/oss-security/2020/06/03/3ghsamailing-listx_refsource_MLISTWEB
- jenkins.io/security/advisory/2020-06-03/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.