First published: Tue Mar 30 2021(Updated: )
Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Extra Columns | <=1.22 | |
maven/org.jenkins-ci.plugins:extra-columns | <=1.22 | 1.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21630 has a severity rating of medium due to its stored cross-site scripting vulnerability that can be exploited by authenticated users.
To fix CVE-2021-21630, upgrade Jenkins Extra Columns Plugin to version 1.23 or later.
CVE-2021-21630 affects users of Jenkins Extra Columns Plugin versions 1.22 and earlier.
CVE-2021-21630 is a stored cross-site scripting (XSS) vulnerability.
An attacker needs Job/Configure permissions to exploit CVE-2021-21630.