Описание
XSS vulnerability in Jenkins Markdown Formatter Plugin
Jenkins Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.
Jenkins Markdown Formatter Plugin 0.2.0 uses a different Markdown library that is not affected by this problem.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-21660
- https://github.com/jenkinsci/markdown-formatter-plugin/commit/6b283a5bba3424fd5174b92e7ad8724cdbdf596c
- https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2198
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-21660
- http://www.openwall.com/lists/oss-security/2021/05/25/3
Пакеты
io.jenkins.plugins:markdown-formatter
<= 0.1.0
0.2.0
Связанные уязвимости
Jenkins Markdown Formatter Plugin 0.1.0 and earlier does not sanitize crafted link target URLs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.