Loading HuntDB...

CVE-2021-21660

UNKNOWN
Published 2021-05-25T14:10:16
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2021-21660. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins Markdown Formatter Plugin 0.1.0 and earlier does not sanitize crafted link target URLs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

XSS vulnerability in Jenkins Markdown Formatter Plugin

GHSA-xqpp-26pp-2365

Advisory Details

Jenkins Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter. Jenkins Markdown Formatter Plugin 0.2.0 uses a different Markdown library that is not affected by this problem.

Affected Packages

Maven io.jenkins.plugins:markdown-formatter
ECOSYSTEM: ≥0 <0.2.0

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: October 27, 2023

References

Published: 2021-05-25T14:10:16
Last Modified: 2024-08-03T18:23:27.399Z
Copied to clipboard!