CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
22.0%
Jenkins Artifact Repository Parameter Plugin 1.0.0 and earlier does not escape parameter names and descriptions.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins Artifact Repository Parameter Plugin 1.0.1 escapes parameter names and descriptions.
Vendor | Product | Version | CPE |
---|---|---|---|
io.jenkins.plugins | artifact-repository-parameter | * | cpe:2.3:a:io.jenkins.plugins:artifact-repository-parameter:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-gc87-qwmv-7x9x
github.com/jenkinsci/artifact-repository-parameter-plugin/commit/84b63f7af101f68d7ccd5bc9c569f453f1f83f82
github.com/jenkinsci/artifact-repository-parameter-plugin/commit/ac6659197807268b9947e80faeafffd35791f96f
nvd.nist.gov/vuln/detail/CVE-2021-21622
www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2168
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
22.0%