First published: Wed Feb 24 2021(Updated: )
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Choices | <=2.5.2 | |
maven/org.biouno:uno-choice | <=2.5.2 | 2.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21616 is considered a high severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2021-21616, upgrade the Jenkins Active Choices Plugin to version 2.5.3 or later.
CVE-2021-21616 affects users of Jenkins Active Choices Plugin versions 2.5.2 and earlier.
Exploiting CVE-2021-21616 allows attackers with Job/Configure permission to execute arbitrary JavaScript in users' browsers.
CVE-2021-21616 is related to other XSS vulnerabilities within the Jenkins ecosystem, particularly those involving insufficient input validation.