Описание
Stored XSS vulnerability in Jenkins FitNesse Plugin
Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.
Jenkins FitNesse Plugin 1.32 escapes content from XML input files before rendering it on the Jenkins UI.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-2175
- https://github.com/jenkinsci/fitnesse-plugin/commit/309d40212338ad6e388f61892e4386f6645438a9
- https://github.com/jenkinsci/fitnesse-plugin/commit/a49167115cc0a3dfca1c139c2c277a7c5c06074d
- https://github.com/jenkinsci/fitnesse-plugin/commit/db72cc49b5cb8a33359805a86a841851673def2d
- https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1801
- http://www.openwall.com/lists/oss-security/2020/04/07/3
Пакеты
Наименование
org.jenkins-ci.plugins:fitnesse
maven
Затронутые версииВерсия исправления
<= 1.31
1.32
Связанные уязвимости
CVSS3: 5.4
nvd
почти 6 лет назад
Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.