QID 375437

Date Published: 2021-04-14

QID 375437: Jenkins Plugins Multiple Security Vulnerabilities(Jenkins Security Advisory 2021-02-24)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

CVE-2021-21616: Stored XSS vulnerability in Active Choices Plugin .
CVE-2021-21617: CSRF vulnerability in Configuration Slicing Plugin .
CVE-2021-21618: Stored XSS vulnerability in Repository Connector Plugin .
CVE-2021-21619: XSS vulnerability in Claim Plugin.
CVE-2021-21620: CSRF vulnerability in Claim Plugin.
CVE-2021-21621: Support bundles can include user session IDs in Support Core Plugin.
CVE-2021-21622: Stored XSS vulnerability in Artifact Repository Parameter Plugin.

Affected Versions:
Active Choices Plugin up to and including 2.5.2
Artifact Repository Parameter Plugin up to and including 1.0.0
Claim Plugin up to and including 2.18.1
Configuration Slicing Plugin up to and including 1.51
Repository Connector Plugin up to and including 2.0.2
Support Core Plugin up to and including 2.72

QID Detection Logic:(Authenticated)
This QID checks for vulnerable versions of Jenkins plugin installed on the target.

Successfully exploiting these issues may allow an attacker to do an unauthorized modification ,disclosure of information.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customer are advised to update the installed plugins in Jenkins.
    For more information visit Jenkins Security Advisory 2021-02-24
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2021-02-24 URL Logo www.jenkins.io/security/advisory/2021-02-24/