Security for everyone

CVE-2020-2096 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in Jenkins Gitlab Hook Plugin affects v. through 1.4.2.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

30 sec

Scan only one




Jenkins Gitlab Hook Plugin is a software tool designed to help developers improve their workflow by automating the process of building and testing code changes. The plugin acts as a bridge between Jenkins and GitLab, allowing developers to trigger builds of their code and receive notifications of the results directly within their preferred software development tools. With Jenkins Gitlab Hook Plugin, developers can save time and ensure code quality by automating these essential tasks.

However, the plugin was found to have a serious vulnerability, identified as CVE-2020-2096. This flaw allows attackers to exploit the build_now endpoint by injecting malicious code in the project name. This results in a reflected cross-site scripting (XSS) attack that can compromise any user who clicks on the link or views the malicious page. The vulnerability was confirmed in Jenkins Gitlab Hook Plugin 1.4.2 and earlier versions.

When exploited, this vulnerability can lead to serious consequences. An attacker can steal sensitive information from users, such as passwords, cookies, and login credentials, by tricking them into clicking on a malicious link. Additionally, this vulnerability can be used to launch phishing attacks, spread malware, or take control of victim's computers., which provides in-depth security vulnerability audits for web applications, can quickly find and help users resolve this vulnerability and others like it. With's professional tools and expertise, users can ensure their digital assets can remain secure and protected against threats. By identifying vulnerabilities and offering tailored solutions, can assist users in safeguarding their web applications from threats like CVE-2020-2096.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture