First published: Wed Feb 24 2021(Updated: )
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name shown in claims. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins. Everyone with a Jenkins account can change their own display name.\n\nClaim Plugin 2.18.2 escapes the user display name shown in claims.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.18.1 | ||
maven/org.jenkins-ci.plugins:claim | <=2.18.1 | 2.18.2 |
Jenkins Claim | <=2.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21619 is classified as a medium severity vulnerability due to its potential for user exploitation through stored cross-site scripting.
To fix CVE-2021-21619, update the Jenkins Claim Plugin to version 2.18.2 or later.
CVE-2021-21619 allows attackers to execute arbitrary scripts in the context of other users' sessions, potentially compromising their accounts.
Versions of Jenkins Claim Plugin prior to 2.18.2, specifically up to and including 2.18.1, are affected by CVE-2021-21619.
Yes, CVE-2021-21619 can be exploited remotely by attackers who can control user display names within Jenkins.