Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tajdxLWNtZjMtbWc3aM4AAnOV

Stored XSS vulnerability in Jenkins on new item page

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.

As of the publication of this advisory, the Jenkins security team is not aware of any plugins published via the Jenkins project update center that allow doing this.\n\nJenkins 2.275, LTS 2.263.2 escapes display names and IDs of item types shown on the New Item page.

Permalink: https://github.com/advisories/GHSA-mj7q-cmf3-mg7h
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tajdxLWNtZjMtbWc3aM4AAnOV
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: 4 months ago


CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Identifiers: GHSA-mj7q-cmf3-mg7h, CVE-2021-21611
References:

Affected Packages

maven:org.jenkins-ci.main:jenkins-core
Versions: >= 2.264, <= 2.274, <= 2.263.1
Fixed in: 2.275, 2.263.2