Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20%281%29 | vendor advisory |
http://www.openwall.com/lists/oss-security/2021/02/24/3 | third party advisory mailing list |