{
  "threat_severity" : "Moderate",
  "public_date" : "2021-10-06T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins-2-plugins/git: stored XSS vulnerability",
    "id" : "2011949",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2011949"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-79",
  "details" : [ "Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.", "A stored cross-site scripting (XSS) vulnerability was found in the Jenkins Git plugin. Due to not escaping the Git SHA-1 checksum parameters provided to commit notifications, an attacker is able to submit crafted commit notifications to the `/git/notifyCommit` endpoint." ],
  "statement" : "This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier [1]\n[1] https://www.jenkins.io/doc/upgrade-guide/2.303/#SECURITY-2452",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.10",
    "release_date" : "2022-03-10T00:00:00Z",
    "advisory" : "RHSA-2022:0055",
    "cpe" : "cpe:/a:redhat:openshift:4.10::el8",
    "package" : "jenkins-2-plugins-0:4.10.1643404185-1.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Fuse 7",
    "fix_state" : "Not affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Out of support scope",
    "package_name" : "jenkins-2-plugins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-21684\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-21684\nhttps://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2499" ],
  "name" : "CVE-2021-21684",
  "csaw" : false
}