RULE(RULE ID:334153)

Rule General Information
Release Date: 2021-11-23
Rule Name: Jenkins Active Choices Plugin Cross Site Scripting Vulnerability (CVE-2021-21699)
Severity:
CVE ID:
Rule Protection Details
Description: Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Impact: An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed.
Affected OS: Windows, Others
Reference: http://www.openwall.com/lists/oss-security/2021/11/12/1
https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2219
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2219