
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-2136 is a stored cross-site scripting (XSS) vulnerability discovered in Jenkins Git Plugin versions 4.2.0 and earlier. The vulnerability was disclosed on March 9, 2020, and affects the Git Plugin component of Jenkins, specifically in the Microsoft TFS field form validation functionality (Jenkins Advisory, CVE Mitre).
The vulnerability exists because the Git Plugin fails to properly escape error messages for the repository URL in the Microsoft TFS field form validation. This security flaw has been assigned a severity rating of Medium according to the CVSS scoring system (Jenkins Advisory).
The vulnerability results in a stored cross-site scripting vulnerability that can be exploited by users who have Job/Configure permission in Jenkins. This could potentially allow attackers to execute malicious scripts in the context of other users' browsers (Jenkins Advisory).
The vulnerability has been fixed in Git Plugin version 4.2.1, which properly escapes the affected part of the error message. Users are advised to upgrade to this version or later to address the security issue (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."