CVE-2021-21616

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21616
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21616.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-21616
Aliases
Published
2021-02-24T16:15:14Z
Modified
2024-09-03T03:40:34.914198Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

References

Affected packages

Git / github.com/jenkinsci/active-choices-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/active-choices-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

uno-choice-0.*

uno-choice-0.1
uno-choice-0.10
uno-choice-0.11
uno-choice-0.12
uno-choice-0.13
uno-choice-0.14
uno-choice-0.15
uno-choice-0.16
uno-choice-0.17
uno-choice-0.18
uno-choice-0.19
uno-choice-0.2
uno-choice-0.20
uno-choice-0.21
uno-choice-0.24
uno-choice-0.3
uno-choice-0.4
uno-choice-0.5
uno-choice-0.6
uno-choice-0.7
uno-choice-0.8
uno-choice-0.9

uno-choice-1.*

uno-choice-1.0
uno-choice-1.1
uno-choice-1.2
uno-choice-1.3
uno-choice-1.4
uno-choice-1.5
uno-choice-1.5-alpha-1
uno-choice-1.5.0
uno-choice-1.5.1
uno-choice-1.5.2
uno-choice-1.5.3
uno-choice-1.5.3-alpha

uno-choice-2.*

uno-choice-2.0
uno-choice-2.1
uno-choice-2.2
uno-choice-2.2.1
uno-choice-2.2.2
uno-choice-2.3
uno-choice-2.4
uno-choice-2.5
uno-choice-2.5.1
uno-choice-2.5.2