First published: Tue Jan 26 2021(Updated: )
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <2.263.3 | |
Jenkins Jenkins | <2.276 | |
redhat/conmon | <2:2.0.21-1.rhaos4.5.el8 | 2:2.0.21-1.rhaos4.5.el8 |
redhat/jenkins | <0:2.263.3.1612434332-1.el7 | 0:2.263.3.1612434332-1.el7 |
redhat/machine-config-daemon | <0:4.5.0-202102050524.p0.git.2594.ff3b8c0.el8 | 0:4.5.0-202102050524.p0.git.2594.ff3b8c0.el8 |
redhat/openshift | <0:4.5.0-202102050524.p0.git.0.9229406.el8 | 0:4.5.0-202102050524.p0.git.0.9229406.el8 |
redhat/openshift-ansible | <0:4.5.0-202102031005.p0.git.0.c6839a2.el7 | 0:4.5.0-202102031005.p0.git.0.c6839a2.el7 |
redhat/openshift-clients | <0:4.5.0-202102051529.p0.git.3612.61b096a.el7 | 0:4.5.0-202102051529.p0.git.3612.61b096a.el7 |
redhat/runc | <0:1.0.0-72.rhaos4.5.giteadfc6b.el8 | 0:1.0.0-72.rhaos4.5.giteadfc6b.el8 |
redhat/jenkins | <0:2.263.3.1612434510-1.el8 | 0:2.263.3.1612434510-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21615 is a vulnerability in Jenkins that allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
CVE-2021-21615 has a severity rating of 5.3 (medium).
To fix CVE-2021-21615, upgrade Jenkins to version 2.276 or Jenkins LTS to version 2.263.3.
You can find more information about CVE-2021-21615 on the CVE website, NIST NVD, and the Jenkins security advisory.
The CWE(s) associated with CVE-2021-21615 are CWE-362, CWE-22, and CWE-367.