Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-2230Cross-site Scripting in Project Jenkins

Severity
5.4MEDIUMNVD
EPSS
0.4%
top 40.49%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 12
Latest updateMay 24

Description

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages2 packages

CVEListV5jenkins_project/jenkinsunspecified2.251+1
NVDjenkins/jenkins2.235.3+1

🔴Vulnerability Details

3
GHSA
Jenkins Cross-site Scripting vulnerability in project naming strategy2022-05-24
OSV
Jenkins Cross-site Scripting vulnerability in project naming strategy2022-05-24
CVEList
CVE-2020-2230: Jenkins 22020-08-12

💥Exploits & PoCs

1
Exploit-DB
Jenkins 2.235.3 - 'Description' Stored XSS2020-12-11

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2020-08-122020-08-12
Red Hat
jenkins: stored XSS vulnerability in project naming strategy2020-08-12

💬Community

2
Bugzilla
CVE-2020-2230 jenkins: stored XSS vulnerability in project naming strategy2020-09-03
Bugzilla
CVE-2020-2230 jenkins: stored XSS vulnerability in project naming strategy [fedora-31]2020-09-03
CVE-2020-2230 — Cross-site Scripting in Project Jenkins | cvebase