3.5 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
22.2%
Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.
Jenkins FitNesse Plugin 1.32 escapes content from XML input files before rendering it on the Jenkins UI.
CPE | Name | Operator | Version |
---|---|---|---|
org.jenkins-ci.plugins:fitnesse | le | 1.31 |
www.openwall.com/lists/oss-security/2020/04/07/3
github.com/advisories/GHSA-f6vx-3fq6-hxm8
github.com/jenkinsci/fitnesse-plugin/commit/309d40212338ad6e388f61892e4386f6645438a9
github.com/jenkinsci/fitnesse-plugin/commit/a49167115cc0a3dfca1c139c2c277a7c5c06074d
github.com/jenkinsci/fitnesse-plugin/commit/db72cc49b5cb8a33359805a86a841851673def2d
jenkins.io/security/advisory/2020-04-07/#SECURITY-1801
nvd.nist.gov/vuln/detail/CVE-2020-2175
3.5 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
22.2%