First published: Tue May 11 2021(Updated: )
Jenkins Dashboard View Plugin 2.15 and earlier does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dashboard View | <=2.15 | |
maven/org.jenkins-ci.plugins:dashboard-view | <2.12.1 | 2.12.1 |
maven/org.jenkins-ci.plugins:dashboard-view | >=2.13<2.16 | 2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Jenkins Dashboard View Plugin is CVE-2021-21649.
The severity of CVE-2021-21649 is medium.
CVE-2021-21649 affects Jenkins Dashboard View Plugin by allowing hackers with View/Configure permission to exploit a stored cross-site scripting (XSS) vulnerability.
Jenkins Dashboard View Plugin version 2.15 and earlier are affected by CVE-2021-21649.
To fix CVE-2021-21649 in Jenkins Dashboard View Plugin, it is recommended to update to a version higher than 2.15.