Stored Cross-Site Scripting Vulnerability in Jenkins Claim Plugin
CVE-2021-21619

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
24 February 2021

Summary

The Jenkins Claim Plugin prior to version 2.18.1 is vulnerable to a stored cross-site scripting (XSS) flaw. This vulnerability arises because the plugin does not properly escape user display names, allowing an attacker to inject malicious scripts. If an attacker can control user display names—either through the security realm or directly within Jenkins—they can exploit this vulnerability to execute arbitrary scripts in the browsers of users viewing the affected content. This may lead to unauthorized actions or data theft.

Affected Version(s)

Jenkins Claim Plugin <= 2.18.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.