Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-2231Cross-site Scripting in Project Jenkins

Severity
5.4MEDIUMNVD
EPSS
0.5%
top 35.30%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 12
Latest updateMay 24

Description

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages2 packages

NVDjenkins/jenkins2.235.3+1
CVEListV5jenkins_project/jenkinsunspecified2.251+1

🔴Vulnerability Details

3
GHSA
Improper Neutralization of Input During Web Page Generation in Jenkins2022-05-24
OSV
Improper Neutralization of Input During Web Page Generation in Jenkins2022-05-24
CVEList
CVE-2020-2231: Jenkins 22020-08-12

💥Exploits & PoCs

1
Exploit-DB
Jenkins 2.235.3 - 'X-Forwarded-For' Stored XSS2020-12-14

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2020-08-122020-08-12
Red Hat
jenkins: stored XSS vulnerability in 'trigger builds remotely'2020-08-12

💬Community

2
Bugzilla
CVE-2020-2231 jenkins: stored XSS vulnerability in 'trigger builds remotely' [fedora-31]2020-09-03
Bugzilla
CVE-2020-2231 jenkins: stored XSS vulnerability in 'trigger builds remotely'2020-09-03
CVE-2020-2231 — Cross-site Scripting in Project Jenkins | cvebase