CVE-2021-21611 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.263.2 || >=2.264 <2.275
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00302 pctl0.52989
Details
Stored XSS vulnerability in Jenkins on new item page Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types. As of the publication of this advisory, the Jenkins security team is not aware of any plugins published via the Jenkins project update center that allow doing this. Jenkins 2.275, LTS 2.263.2 escapes display names and IDs of item types shown on the New Item page.
Metadata
Created: 2022-05-24T17:39:13Z
Modified: 2023-12-14T15:40:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mj7q-cmf3-mg7h/GHSA-mj7q-cmf3-mg7h.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-mj7q-cmf3-mg7h
Finding: F425
Auto approve: 1