Enhancement: cves/2020/CVE-2020-2140.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-04 12:02:56 -04:00
parent 41777305f8
commit 63ab11e6ee
1 changed files with 4 additions and 1 deletions

View File

@ -1,12 +1,13 @@
id: CVE-2020-2140 id: CVE-2020-2140
info: info:
name: Jenkin Audit Trail Plugin XSS name: Jenkin Audit Trail <=3.2 - Cross-Site Scripting
author: j3ssie/geraldino2 author: j3ssie/geraldino2
severity: medium severity: medium
description: Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability. description: Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability.
reference: reference:
- https://www.jenkins.io/security/advisory/2020-03-09/ - https://www.jenkins.io/security/advisory/2020-03-09/
- https://nvd.nist.gov/vuln/detail/CVE-2020-2140
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1 cvss-score: 6.1
@ -35,3 +36,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/05/04