Stored Cross-Site Scripting Vulnerability in Jenkins Scriptler Plugin
CVE-2021-21667
5.4MEDIUM
Summary
The Jenkins Scriptler Plugin versions 3.2 and earlier contain a flaw that does not properly escape parameter names displayed in job configuration forms. This oversight can be exploited by attackers who possess Scriptler/Configure permissions, allowing them to inject malicious scripts. When executed, these scripts can affect any user accessing the vulnerable job configurations, leading to unauthorized actions or data exposure.
Affected Version(s)
Jenkins Scriptler Plugin <= 3.2
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved