Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xZzY2LXh2N3YtbTgzNM4AAl8l
Stored XSS vulnerability in computer-queue-plugin Plugin
computer-queue-plugin Plugin 1.5 and earlier does not escape the agent name in tooltips.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
computer-queue-plugin Plugin 1.6 escapes the agent name in tooltips.
Permalink: https://github.com/advisories/GHSA-qg66-xv7v-m834JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xZzY2LXh2N3YtbTgzNM4AAl8l
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: 9 months ago
CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-qg66-xv7v-m834, CVE-2020-2259
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2259
- https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1912
- http://www.openwall.com/lists/oss-security/2020/09/16/3
- https://github.com/jenkinsci/computer-queue-plugin/commit/38776c0716470038d922829f675ab278a079acfb
- https://github.com/advisories/GHSA-qg66-xv7v-m834
Blast Radius: 1.0
Affected Packages
maven:jenkins.ci.plugins.computerqueue:computer-queue-plugin
Affected Version Ranges: <= 1.5Fixed in: 1.6