CVE-2021-21649 – org.jenkins-ci.plugins:dashboard-view
Package
Manager: maven
Name: org.jenkins-ci.plugins:dashboard-view
Vulnerable Version: >=2.13 <2.16 || >=0 <2.12.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00982 pctl0.75913
Details
Cross-site Scripting in Jenkins Dashboard View Plugin Jenkins Dashboard View Plugin prior to 2.16 and 2.12.1 does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission. As part of this fix, the property for image URLs was changed from `url` to `imageUrl`. Existing [Configuration as Code](https://plugins.jenkins.io/configuration-as-code/) configurations are still supported, but exports will emit the new property.
Metadata
Created: 2021-06-16T17:24:41Z
Modified: 2023-10-27T14:30:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-jwhm-9cjm-4493/GHSA-jwhm-9cjm-4493.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-jwhm-9cjm-4493
Finding: F425
Auto approve: 1