Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWdjaHEtOXI2OC02and2
Cross-Site Request Forgery in Jenkins Credentials Plugin
Jenkins Credentials Plugin prior to 2.3.19, 2.3.15.1, 2.3.14.1, 2.3.13.1, 2.3.7.1, and 2.3.0.1 does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability.
Jenkins Credentials Plugin 2.3.19, 2.3.15.1, 2.3.14.1, 2.3.13.1, 2.3.7.1, and 2.3.0.1 restricts the user-controlled information it provides to a safe subset.
Permalink: https://github.com/advisories/GHSA-gchq-9r68-6jwvJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWdjaHEtOXI2OC02and2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: 12 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00078
EPSS Percentile: 0.35503
Identifiers: GHSA-gchq-9r68-6jwv, CVE-2021-21648
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-21648
- https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349
- https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21648.json
- https://github.com/jenkinsci/credentials-plugin/commit/41f3ec1143f80a7e80ab9a4a5f861f26fd3792cc
- https://github.com/advisories/GHSA-gchq-9r68-6jwv
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:credentials
Affected Version Ranges: < 2.3.0.1, >= 2.3.1, < 2.3.7.1, >= 2.3.8, < 2.3.13.1, = 2.3.14, = 2.3.15, >= 2.3.16, < 2.3.19Fixed in: 2.3.0.1, 2.3.7.1, 2.3.13.1, 2.3.14.1, 2.3.15.1, 2.3.19