You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /root/.m2/repository/org/jenkins-ci/plugins/matrix-project/1.7.1/matrix-project-1.7.1.jar
Dependency Hierarchy:
perfpublisher-8.05.jar (Root Library)
❌ matrix-project-1.7.1.jar (Vulnerable Library)
Vulnerability Details
Jenkins Matrix Project Plugin 1.16 and earlier does not escape the axis names shown in tooltips on the overview page of builds with multiple axes, resulting in a stored cross-site scripting vulnerability.
mend-for-github-combot
changed the title
CVE-2020-2225 (High) detected in matrix-project-1.7.1.jar
CVE-2020-2225 (Medium) detected in matrix-project-1.7.1.jar
Oct 8, 2020
CVE-2020-2225 - Medium Severity Vulnerability
Vulnerable Library - matrix-project-1.7.1.jar
Multi-configuration (matrix) project type.
Library home page: https://wiki.jenkins-ci.org/display/JENKINS/Matrix+Project+Plugin
Path to dependency file: influxdb-plugin/pom.xml
Path to vulnerable library: /root/.m2/repository/org/jenkins-ci/plugins/matrix-project/1.7.1/matrix-project-1.7.1.jar
Dependency Hierarchy:
Vulnerability Details
Jenkins Matrix Project Plugin 1.16 and earlier does not escape the axis names shown in tooltips on the overview page of builds with multiple axes, resulting in a stored cross-site scripting vulnerability.
Publish Date: 2020-07-15
URL: CVE-2020-2225
CVSS 3 Score Details (5.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2020-07-15/
Release Date: 2020-07-15
Fix Resolution: org.jenkins-ci.plugins:matrix-project:1.17
The text was updated successfully, but these errors were encountered: