Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-21684

Опубликовано: 06 окт. 2021
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.

A stored cross-site scripting (XSS) vulnerability was found in the Jenkins Git plugin. Due to not escaping the Git SHA-1 checksum parameters provided to commit notifications, an attacker is able to submit crafted commit notifications to the /git/notifyCommit endpoint.

Отчет

This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier [1] [1] https://www.jenkins.io/doc/upgrade-guide/2.303/#SECURITY-2452

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7jenkinsNot affected
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsOut of support scope
Red Hat OpenShift Container Platform 4.10jenkins-2-pluginsFixedRHSA-2022:005510.03.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=2011949jenkins-2-plugins/git: stored XSS vulnerability

EPSS

Процентиль: 41%
0.00193
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 4 лет назад

Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.

CVSS3: 6.1
github
больше 3 лет назад

Stored XSS vulnerability in Jenkins Git Plugin

EPSS

Процентиль: 41%
0.00193
Низкий

6.1 Medium

CVSS3