Vulnerability Details CVE-2020-2238
Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 46.1%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 3.5
Products affected by CVE-2020-2238
-
cpe:2.3:a:jenkins:git_parameter:0.1
-
cpe:2.3:a:jenkins:git_parameter:0.2
-
cpe:2.3:a:jenkins:git_parameter:0.3
-
cpe:2.3:a:jenkins:git_parameter:0.3.1
-
cpe:2.3:a:jenkins:git_parameter:0.3.2
-
cpe:2.3:a:jenkins:git_parameter:0.4
-
cpe:2.3:a:jenkins:git_parameter:0.5.0
-
cpe:2.3:a:jenkins:git_parameter:0.5.1
-
cpe:2.3:a:jenkins:git_parameter:0.6.0
-
cpe:2.3:a:jenkins:git_parameter:0.6.1
-
cpe:2.3:a:jenkins:git_parameter:0.6.2
-
cpe:2.3:a:jenkins:git_parameter:0.7.0
-
cpe:2.3:a:jenkins:git_parameter:0.7.1
-
cpe:2.3:a:jenkins:git_parameter:0.7.2
-
cpe:2.3:a:jenkins:git_parameter:0.8.0
-
cpe:2.3:a:jenkins:git_parameter:0.8.1
-
cpe:2.3:a:jenkins:git_parameter:0.9.0
-
cpe:2.3:a:jenkins:git_parameter:0.9.1
-
cpe:2.3:a:jenkins:git_parameter:0.9.10
-
cpe:2.3:a:jenkins:git_parameter:0.9.11
-
cpe:2.3:a:jenkins:git_parameter:0.9.12
-
cpe:2.3:a:jenkins:git_parameter:0.9.2
-
cpe:2.3:a:jenkins:git_parameter:0.9.3
-
cpe:2.3:a:jenkins:git_parameter:0.9.4
-
cpe:2.3:a:jenkins:git_parameter:0.9.5
-
cpe:2.3:a:jenkins:git_parameter:0.9.6
-
cpe:2.3:a:jenkins:git_parameter:0.9.7
-
cpe:2.3:a:jenkins:git_parameter:0.9.8
-
cpe:2.3:a:jenkins:git_parameter:0.9.9