Stored XSS Threat in Jenkins Active Choices Plugin
CVE-2021-21699

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 November 2021

Summary

The Active Choices Plugin in Jenkins, version 2.5.6 and earlier, is vulnerable to a stored cross-site scripting (XSS) flaw due to improper escaping of parameter names for reactive parameters and dynamic reference parameters. This vulnerability can be exploited by attackers holding Job/Configure permissions, allowing them to inject malicious scripts that are stored and executed in the context of other users, posing a significant security risk.

Affected Version(s)

Jenkins Active Choices Plugin <= 2.5.6

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.