mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-30 04:49:42 +00:00
31 lines
1.3 KiB
Markdown
31 lines
1.3 KiB
Markdown
### [CVE-2020-2096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2096)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Elsfa7-110/kenzer-templates
|
|
- https://github.com/The-Cracker-Technology/jaeles
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
|
- https://github.com/jaeles-project/jaeles
|
|
- https://github.com/jaeles-project/jaeles-signatures
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/merlinepedra/nuclei-templates
|
|
- https://github.com/merlinepedra25/nuclei-templates
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/sobinge/nuclei-templates
|
|
- https://github.com/webexplo1t/Jaeles
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
|