Vulnerability Details CVE-2020-2112
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 32.3%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 3.5
Products affected by CVE-2020-2112
-
cpe:2.3:a:jenkins:git_parameter:0.1
-
cpe:2.3:a:jenkins:git_parameter:0.2
-
cpe:2.3:a:jenkins:git_parameter:0.3
-
cpe:2.3:a:jenkins:git_parameter:0.3.1
-
cpe:2.3:a:jenkins:git_parameter:0.3.2
-
cpe:2.3:a:jenkins:git_parameter:0.4
-
cpe:2.3:a:jenkins:git_parameter:0.5.0
-
cpe:2.3:a:jenkins:git_parameter:0.5.1
-
cpe:2.3:a:jenkins:git_parameter:0.6.0
-
cpe:2.3:a:jenkins:git_parameter:0.6.1
-
cpe:2.3:a:jenkins:git_parameter:0.6.2
-
cpe:2.3:a:jenkins:git_parameter:0.7.0
-
cpe:2.3:a:jenkins:git_parameter:0.7.1
-
cpe:2.3:a:jenkins:git_parameter:0.7.2
-
cpe:2.3:a:jenkins:git_parameter:0.8.0
-
cpe:2.3:a:jenkins:git_parameter:0.8.1
-
cpe:2.3:a:jenkins:git_parameter:0.9.0
-
cpe:2.3:a:jenkins:git_parameter:0.9.1
-
cpe:2.3:a:jenkins:git_parameter:0.9.10
-
cpe:2.3:a:jenkins:git_parameter:0.9.11
-
cpe:2.3:a:jenkins:git_parameter:0.9.2
-
cpe:2.3:a:jenkins:git_parameter:0.9.3
-
cpe:2.3:a:jenkins:git_parameter:0.9.4
-
cpe:2.3:a:jenkins:git_parameter:0.9.5
-
cpe:2.3:a:jenkins:git_parameter:0.9.6
-
cpe:2.3:a:jenkins:git_parameter:0.9.7
-
cpe:2.3:a:jenkins:git_parameter:0.9.8
-
cpe:2.3:a:jenkins:git_parameter:0.9.9