Stored XSS Threat in Jenkins Active Choices Plugin
CVE-2021-21699
5.4MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 November 2021
Summary
The Active Choices Plugin in Jenkins, version 2.5.6 and earlier, is vulnerable to a stored cross-site scripting (XSS) flaw due to improper escaping of parameter names for reactive parameters and dynamic reference parameters. This vulnerability can be exploited by attackers holding Job/Configure permissions, allowing them to inject malicious scripts that are stored and executed in the context of other users, posing a significant security risk.
Affected Version(s)
Jenkins Active Choices Plugin <= 2.5.6
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved