Stored Cross-Site Scripting Vulnerability in Jenkins REST List Parameter Plugin
CVE-2021-21635

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
30 March 2021

Summary

The Jenkins REST List Parameter Plugin versions 1.3.0 and earlier contain a vulnerability where a parameter name reference is not escaped in embedded JavaScript. This oversight could allow attackers with Job/Configure permission to exploit the system, leading to the potential execution of malicious scripts in the context of the victim's browser, thus compromising user sessions and data integrity.

Affected Version(s)

Jenkins REST List Parameter Plugin <= 1.3.0

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.