logo

CVE-2021-21618 org.jenkins-ci.plugins:repository-connector

Package

Manager: maven
Name: org.jenkins-ci.plugins:repository-connector
Vulnerable Version: >=0 <2.0.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00982 pctl0.75913

Details

Stored XSS vulnerability in Jenkins Repository Connector Plugin Jenkins Repository Connector Plugin 2.0.2 and earlier does not escape parameter names and descriptions for past builds. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins Repository Connector Plugin 2.0.3 escapes parameter names and descriptions when creating new parameters.

Metadata

Created: 2022-05-24T17:43:00Z
Modified: 2023-10-27T13:29:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hg2w-3c4j-jjwm/GHSA-hg2w-3c4j-jjwm.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-hg2w-3c4j-jjwm
Finding: F425
Auto approve: 1