Skip to content
This repository has been archived by the owner on Jan 25, 2022. It is now read-only.

CVE-2020-2096/SECURITY-1683 issue #62

Open
LeonHagenaarsKeus opened this issue Aug 12, 2020 · 1 comment
Open

CVE-2020-2096/SECURITY-1683 issue #62

LeonHagenaarsKeus opened this issue Aug 12, 2020 · 1 comment

Comments

@LeonHagenaarsKeus
Copy link

Jenkins states that the plugin has a CVE where not escaping project names in 'build_now' results in a reflected cross-site scripting vulnerability.

https://www.jenkins.io/security/advisory/2020-01-15/#SECURITY-1683

@LeonHagenaarsKeus
Copy link
Author

The main issue appears to be

"Don't know how to process '/#{params[:splat].first}'",

where

          "Don't know how to process '/#{CGI::escapeHTML(params[:splat].first)}'",

or similar would fix the issue.

Can't test/build at the moment, as setting up a test environment which can run the version of ruby required takes more time then I currently have available.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant