QID 376373

Date Published: 2022-02-09

QID 376373: Jenkins Plugins Multiple Security Vulnerabilities (Jenkins Security Advisory 2021-11-12)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

CVE-2021-21699:Stored XSS vulnerability in Active Choices Plugin
CVE-2021-21700:Stored XSS vulnerability in Scriptler Plugin
CVE-2021-21701:XXE vulnerability in Performance Plugin
CVE-2021-43576:XXE vulnerability in pom2config Plugin
CVE-2021-43577:XXE vulnerability in OWASP Dependency-Check Plugin

Affected Versions:
Active Choices Plugin up to and including 2.5.6
OWASP Dependency-Check Plugin up to and including 5.1.1
Performance Plugin up to and including 3.20
pom2config Plugin up to and including 1.2
Scriptler Plugin up to and including 3.3

QID Detection Logic:(Authenticated)
This QID checks for vulnerable versions of Jenkins plugin installed on the target.

Successfully exploiting these issues may allow an attacker to do an unauthorized modification ,disclosure of information.

  • CVSS V3 rated as High - 7.1 severity.
  • CVSS V2 rated as Medium - 5.5 severity.
  • Solution
    Customer are advised to update the installed plugins in Jenkins.
    For more information visit Jenkins Security Advisory 2021-11-12
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2021-11-12 URL Logo www.jenkins.io/security/advisory/2021-11-12/