Stored XSS Vulnerability in Jenkins Git Plugin Affects Developer Tools
CVE-2021-21684
6.1MEDIUM
Summary
The Jenkins Git Plugin, specifically versions 4.8.2 and earlier, contains a vulnerability where Git SHA-1 checksum parameters are not properly escaped. This oversight allows attackers to inject harmful scripts into the build cause, resulting in a stored cross-site scripting (XSS) vulnerability. When users view build notifications, these scripts can execute in their browsers, potentially compromising user data and affecting application integrity. It is critical for organizations using the affected versions of the Git Plugin to apply the necessary updates to mitigate this serious threat.
Affected Version(s)
Jenkins Git Plugin <= 4.8.2
Jenkins Git Plugin 4.7.1.1
Jenkins Git Plugin 4.3.1
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved