{"id":"CVE-2021-21652","details":"A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.","aliases":["GHSA-rrvg-2c69-p9rf"],"modified":"2026-04-12T01:01:44.592709Z","published":"2021-05-11T15:15:08.030Z","references":[{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20%281%29"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/xray-connector-plugin","events":[{"introduced":"0"},{"last_affected":"29b3791f7c34e0ff0570744514f79f18363dc772"}],"database_specific":{"cpe":"cpe:2.3:a:jenkins:xray_-_test_management_for_jira:*:*:*:*:*:jenkins:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.4.0"}]}}],"versions":["v2.0.0","v2.0.1","xray-connector-2.1.2","xray-connector-2.3.0","xray-connector-2.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21652.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}]}