Miggo Logo

CVE-2020-2266: Stored XSS vulnerability in Description Column Plugin

8

CVSS Score
3.1

Basic Information

EPSS Score
0.46137%
Published
5/24/2022
Updated
1/28/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:description-column-pluginmaven<= 1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly states the vulnerability stems from unescaped job descriptions in column tooltips. In Jenkins plugin architecture:

  1. Column rendering typically involves Java classes extending Column
  2. Tooltip content generation would likely be handled by a method like getTooltip()
  3. The lack of escaping suggests missing Util.escape() or equivalent output encoding
  4. High confidence comes from the direct match between described vulnerability pattern (unfiltered job description in UI element) and common Jenkins plugin implementation patterns, even without seeing the exact code.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins **s*ription *olumn Plu*in *.* *n* **rli*r *o*s not *s**p* t** jo* **s*ription in t** *olumn tooltip, r*sultin* in * stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xploit**l* *y *tt**k*rs wit* Jo*/*on*i*ur* p*rmission.

Reasoning

T** **visory *xpli*itly st*t*s t** vuln*r**ility st*ms *rom un*s**p** jo* **s*riptions in *olumn tooltips. In J*nkins plu*in *r**it**tur*: *. *olumn r*n**rin* typi**lly involv*s J*v* *l*ss*s *xt*n*in* *olumn *. Tooltip *ont*nt **n*r*tion woul* lik*ly