Jenkins.Active.Choices.Plugin.CVE-2021-21699.Stored.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in Jenkins Active Choices Plugin.
This vulnerability is due to insufficient validation of parameter name of reactive parameters and dynamic reference parameters. A remote, authenticated attacker could exploit this vulnerability by sending a crafted message to a vulnerable server. Successful exploitation could result in execution of script code in the security context of target user's browser.
Affected Products
Jenkins Active Choices Plugin prior to 2.5.7
Impact
System Compromise: Remote attackers can execute arbitrary script code in the context of the affected application.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2219
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |