Stored Cross-Site Scripting Vulnerability in Jenkins REST List Parameter Plugin
CVE-2021-21635
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 30 March 2021
Summary
The Jenkins REST List Parameter Plugin versions 1.3.0 and earlier contain a vulnerability where a parameter name reference is not escaped in embedded JavaScript. This oversight could allow attackers with Job/Configure permission to exploit the system, leading to the potential execution of malicious scripts in the context of the victim's browser, thus compromising user sessions and data integrity.
Affected Version(s)
Jenkins REST List Parameter Plugin <= 1.3.0
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved