Stored XSS Vulnerability in Jenkins Scriptler Plugin
CVE-2021-21700
5.4MEDIUM
Summary
The Jenkins Scriptler Plugin version 3.3 and earlier allows stored cross-site scripting (XSS) vulnerabilities due to improper handling of script names within the user interface. When users are prompted to confirm deletion of scripts, the names are not correctly escaped, enabling attackers to create malicious Scriptler scripts. This can lead to the execution of arbitrary JavaScript code in the context of victims' sessions, posing security risks that can compromise user data and application integrity. It is crucial for users of the affected plugin to update their installations to mitigate this risk.
Affected Version(s)
Jenkins Scriptler Plugin <= 3.3
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved