From 63ab11e6eeaaeba6f50587e629da2b62ade2250d Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 4 May 2022 12:02:56 -0400 Subject: [PATCH] Enhancement: cves/2020/CVE-2020-2140.yaml by mp --- cves/2020/CVE-2020-2140.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-2140.yaml b/cves/2020/CVE-2020-2140.yaml index d6d3ef4a66..fb59ceea13 100644 --- a/cves/2020/CVE-2020-2140.yaml +++ b/cves/2020/CVE-2020-2140.yaml @@ -1,12 +1,13 @@ id: CVE-2020-2140 info: - name: Jenkin Audit Trail Plugin XSS + name: Jenkin Audit Trail <=3.2 - Cross-Site Scripting author: j3ssie/geraldino2 severity: medium description: Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability. reference: - https://www.jenkins.io/security/advisory/2020-03-09/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-2140 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 @@ -35,3 +36,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/05/04