First published: Tue May 11 2021(Updated: )
Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides. This results in a reflected cross-site scripting (XSS) vulnerability. Credentials Plugin 2.3.19 restricts the user-controlled information it provides to a safe subset. References: <a href="https://www.jenkins.io/security/advisory/2021-05-11/">https://www.jenkins.io/security/advisory/2021-05-11/</a>
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.8.1624022417-1.el8 | 2-plugins-0:4.8.1624022417-1.el8 |
Jenkins Credentials | <=2.3.18 | |
redhat/credentials | <2.3.19 | 2.3.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21648 is a vulnerability in Jenkins Credentials Plugin that allows for a reflected cross-site scripting (XSS) attack.
CVE-2021-21648 has a severity rating of 8.8 (high).
Jenkins Credentials Plugin versions 2.3.18 and earlier are affected.
To fix CVE-2021-21648, upgrade your Jenkins Credentials Plugin to version 2.3.19 or later.
You can find more information about CVE-2021-21648 at the following links: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2021-05-11/), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:2437).