CVE-2020-2229:
Jenkins Cross-Site Scripting vulnerability in help icons
8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88132%
CWE
Published
5/24/2022
Updated
12/22/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | <= 2.235.3 | 2.235.4 |
org.jenkins-ci.main:jenkins-core | maven | >= 2.236, <= 2.251 | 2.252 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the unescaped 'tooltip' attribute in the Jelly template responsible for rendering help icons. The commit diff shows the addition of h.xmlEscape()
to sanitize this attribute. Since Jelly templates generate HTML/XML content, the lack of escaping in the original code allowed raw user/plugin-provided tooltip content to be interpreted as HTML/XML, enabling XSS. The test cases added in the commit explicitly validate()
XSS prevention by checking that injected HTML payloads are escaped, confirming this as the attack vector.