Description
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2338 | Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins. |
Github GHSA |
GHSA-48hr-jg4p-w4p4 | XSS vulnerability in Jenkins Claim Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:16:23.683Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21619
No data.
Status : Modified
Published: 2021-02-24T16:15:14.983
Modified: 2024-11-21T05:48:42.633
Link: CVE-2021-21619
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA