Severity
5.4MEDIUM
EPSS
0.2%
top 53.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 8
Latest updateMay 24

Description

Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages3 packages

🔴Vulnerability Details

4
OSV
Stored XSS vulnerability in Jenkins Active Choices Plugin2022-05-24
GHSA
Stored XSS vulnerability in Jenkins Active Choices Plugin2022-05-24
CVEList
CVE-2020-2290: Jenkins Active Choices Plugin 22020-10-08
GHSA
Lack of URL normalization may lead to authorization bypass when URL access rules are used2020-09-09

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2020-10-082020-10-08
CVE-2020-2290 (MEDIUM CVSS 5.4) | Jenkins Active Choices Plugin 2.4 a | cvebase.io