First published: Wed Jun 16 2021(Updated: )
Jenkins Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Scriptler | <=3.2 | |
maven/org.jenkins-ci.plugins:scriptler | <3.3 | 3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21667 is classified as a high severity stored cross-site scripting (XSS) vulnerability.
To fix CVE-2021-21667, upgrade the Jenkins Scriptler Plugin to version 3.3 or later.
Users of Jenkins Scriptler Plugin versions 3.2 and earlier are affected by CVE-2021-21667.
CVE-2021-21667 is a stored cross-site scripting (XSS) vulnerability.
An attacker needs Scriptler/Configure permission to exploit CVE-2021-21667.