CVE-2021-21673

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21673
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21673.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-21673
Aliases
Published
2021-06-30T17:15:09Z
Modified
2024-09-03T03:40:44.751108Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Jenkins CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

References

Affected packages

Git / github.com/jenkinsci/cas-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/cas-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

cas-plugin-1.*

cas-plugin-1.0.0
cas-plugin-1.1.0
cas-plugin-1.1.1
cas-plugin-1.1.2
cas-plugin-1.2.0
cas-plugin-1.3.0
cas-plugin-1.4.0
cas-plugin-1.4.1
cas-plugin-1.4.2
cas-plugin-1.4.3
cas-plugin-1.5.0
cas-plugin-1.6.0