Moderate severityNVD Advisory· Published Jul 2, 2020· Updated Aug 4, 2024
CVE-2020-2217
CVE-2020-2217
Description
Jenkins Compatibility Action Storage Plugin 1.0 and earlier does not escape the content coming from the MongoDB in the testConnection form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:compatibility-action-storageMaven | <= 1.0 | — |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-rfrq-3v89-fqg6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-2217ghsaADVISORY
- www.openwall.com/lists/oss-security/2020/07/02/7ghsamailing-listx_refsource_MLISTWEB
- jenkins.io/security/advisory/2020-07-02/ghsax_refsource_CONFIRMWEB
News mentions
1- Jenkins Security Advisory 2020-07-02Jenkins Security Advisories · Jul 2, 2020