Description
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2338 | Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins. |
Github GHSA |
GHSA-48hr-jg4p-w4p4 | XSS vulnerability in Jenkins Claim Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:16:23.683Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21619
No data.
Status : Modified
Published: 2021-02-24T16:15:14.983
Modified: 2024-11-21T05:48:42.633
Link: CVE-2021-21619
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA