### [CVE-2020-2096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2096) ![](https://img.shields.io/static/v1?label=Product&message=Jenkins%20Gitlab%20Hook%20Plugin&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability. ### POC #### Reference - http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/The-Cracker-Technology/jaeles - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/jaeles-project/jaeles - https://github.com/jaeles-project/jaeles-signatures - https://github.com/lnick2023/nicenice - https://github.com/merlinepedra/nuclei-templates - https://github.com/merlinepedra25/nuclei-templates - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/sobinge/nuclei-templates - https://github.com/webexplo1t/Jaeles - https://github.com/xbl3/awesome-cve-poc_qazbnm456