{"id":"CVE-2020-2255","details":"A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.","aliases":["GHSA-vc7g-4269-f7hw"],"modified":"2026-04-10T04:24:40.994793Z","published":"2020-09-16T14:15:13.237Z","references":[{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/09/16/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/blueocean-plugin","events":[{"introduced":"0"},{"last_affected":"6a14f41b63cfd3e7e732be6cf5b93b7c491e8f29"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.23.2"}]}}],"versions":["blueocean-parent-1.0-alpha-1","blueocean-parent-1.0-alpha-2","blueocean-parent-1.0-alpha-3","blueocean-parent-1.0-alpha-4","blueocean-parent-1.0-alpha-5","blueocean-parent-1.0-alpha-6","blueocean-parent-1.0-alpha-7","blueocean-parent-1.0-alpha-8","blueocean-parent-1.0-alpha-9","blueocean-parent-1.0.0-b01","blueocean-parent-1.0.0-b02","blueocean-parent-1.0.0-b03","blueocean-parent-1.0.0-b04","blueocean-parent-1.0.0-b05","blueocean-parent-1.0.0-b06","blueocean-parent-1.0.0-b07","blueocean-parent-1.0.0-b08","blueocean-parent-1.0.0-b09","blueocean-parent-1.0.0-b10","blueocean-parent-1.0.0-b11","blueocean-parent-1.0.0-b12","blueocean-parent-1.0.0-b13","blueocean-parent-1.0.0-b14","blueocean-parent-1.0.0-b15","blueocean-parent-1.0.0-b16","blueocean-parent-1.0.0-b17","blueocean-parent-1.0.0-b18","blueocean-parent-1.0.0-b19","blueocean-parent-1.0.0-b20","blueocean-parent-1.0.0-b21","blueocean-parent-1.0.0-b22","blueocean-parent-1.0.0-b23","blueocean-parent-1.0.0-b24","blueocean-parent-1.0.0-b25","blueocean-parent-1.0.0-rc1","blueocean-parent-1.0.0-rc2","blueocean-parent-1.0.0-rc3","blueocean-parent-1.1.0-beta-1","blueocean-parent-1.1.0-beta-2","blueocean-parent-1.1.0-beta-3","blueocean-parent-1.1.0-beta-4","blueocean-parent-1.1.0-beta-5","blueocean-parent-1.1.0-beta-6","blueocean-parent-1.1.0-beta-7","blueocean-parent-1.1.0-beta-8","blueocean-parent-1.1.0-beta-9","blueocean-parent-1.2.0-beta-1","blueocean-parent-1.2.0-beta-2","blueocean-parent-1.2.0-beta-3","blueocean-parent-1.2.0-beta-4","blueocean-parent-1.2.0-beta-5","blueocean-parent-1.22","blueocean-parent-1.23.2","blueocean-parent-1.3.0-beta-1","blueocean-parent-1.3.0-beta-2","blueocean-parent-1.3.0-beta-3","blueocean-parent-1.3.0-beta-4","blueocean-parent-1.3.0-beta-5","blueocean-parent-1.4.0-beta-1","blueocean-parent-1.4.0-beta-2","blueocean-parent-1.4.0-beta-3","blueocean-parent-1.4.0-beta-4","blueocean-parent-1.4.0-beta-5","blueocean-parent-1.5.0-beta-1","blueocean-parent-1.5.0-beta-2","blueocean-parent-1.6.0-beta-1","blueocean-parent-1.6.0-beta-2","blueocean-parent-1.6.0-beta-3","untagged-78fa3458d6166cfaa69a","untagged-b609caa8ce13cd5866a0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2255.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}