Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1mOWdmLTJxODctNW00NM4AAqqe

Stored XSS vulnerability in Jenkins Scriptler Plugin

Jenkins Scriptler Plugin 3.3 and earlier does not escape the name of scripts on the UI when asking to confirm their deletion.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Scriptler scripts.

Jenkins Scriptler Plugin 3.4 escapes the name of scripts on the UI when asking to confirm their deletion.

Permalink: https://github.com/advisories/GHSA-f9gf-2q87-5m44
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mOWdmLTJxODctNW00NM4AAqqe
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago


CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-f9gf-2q87-5m44, CVE-2021-21700
References: Repository: https://github.com/jenkinsci/scriptler-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:scriptler
Affected Version Ranges: <= 3.3
Fixed in: 3.4