VYPR
High severityNVD Advisory· Published Sep 1, 2020· Updated Aug 4, 2024

CVE-2020-2244

CVE-2020-2244

Description

Jenkins Build Failure Analyzer Plugin 1.27.0 and earlier does not escape matching text in a form validation response, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to provide console output for builds used to test build log indications.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins Build Failure Analyzer Plugin 1.27.0 and earlier have a stored XSS vulnerability due to unescaped matching text in form validation responses.

Vulnerability

Description Jenkins Build Failure Analyzer Plugin versions 1.27.0 and earlier fail to escape matching text in a form validation response. This allows attackers to inject arbitrary HTML and JavaScript, leading to a stored cross-site scripting (XSS) vulnerability [1][3].

Exploitation

An attacker must be able to provide console output for builds that are used to test build log indications [1]. The vulnerability is triggered when the plugin processes a build log and displays the matching text in a validation response without proper encoding [3]. No special authentication is required beyond being able to trigger builds with crafted console output.

Impact

Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the Jenkins user viewing the affected page. This could lead to session hijacking, credential theft, or other malicious actions within Jenkins [1].

Mitigation

The Build Failure Analyzer Plugin version 1.27.1 fixes the issue by properly escaping matching text in form validation responses [2]. Users should update to this version or later. No workarounds are mentioned in the advisory.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzerMaven
< 1.27.11.27.1

Affected products

2

Patches

1
c974938f213d

[SECURITY-1770]

1 file changed · +1 1
  • src/main/java/com/sonyericsson/jenkins/plugins/bfa/model/indication/BuildLogIndication.java+1 1 modified
    @@ -327,7 +327,7 @@ && isValidBuildId(urlParts[2])) {
                                 if (foundIndication == null) {
                                     return FormValidation.warning(Messages.StringDoesNotMatchPattern());
                                 }
    -                            return FormValidation.okWithMarkup(foundIndication.getFirstMatchingLine());
    +                            return FormValidation.ok(foundIndication.getFirstMatchingLine());
                             } catch (IOException e) {
                                 return FormValidation.error(Messages.FailedToScanFile_Error());
                             }
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

1