CVE-2021-21613: XSS vulnerability in Jenkins TICS Plugin
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized rendering of TICS service responses. Key evidence includes:
The patched version introduces Jsoup.clean() sanitization in TqiPublisherResultBuilder when processing formattedValue
The Jelly template changed from 'escape-by-default="false"' to 'escape-by-default="true"'
Removed HtmlTag.java helper class that manually constructed HTML strings without contextual escaping
Added MetricData.java with explicit value sanitization logic
These changes indicate the vulnerability existed in data processing and template rendering paths that handled raw API responses.