logo

CVE-2021-21611 org.jenkins-ci.main:jenkins-core

Package

Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.263.2 || >=2.264 <2.275

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00302 pctl0.52989

Details

Stored XSS vulnerability in Jenkins on new item page Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types. As of the publication of this advisory, the Jenkins security team is not aware of any plugins published via the Jenkins project update center that allow doing this. Jenkins 2.275, LTS 2.263.2 escapes display names and IDs of item types shown on the New Item page.

Metadata

Created: 2022-05-24T17:39:13Z
Modified: 2023-12-14T15:40:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mj7q-cmf3-mg7h/GHSA-mj7q-cmf3-mg7h.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-mj7q-cmf3-mg7h
Finding: F425
Auto approve: 1