First published: Wed Feb 24 2021(Updated: )
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configurations.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Support Core | <=2.72 | |
maven/org.jenkins-ci.plugins:support-core | <=2.72 | 2.72.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21621 has a CVSS score that indicates a high severity due to potential exposure of user session IDs.
To fix CVE-2021-21621, upgrade the Jenkins Support Core Plugin to version 2.72.1 or later.
CVE-2021-21621 affects Jenkins Support Core Plugin versions 2.72 and earlier.
CVE-2021-21621 is a security vulnerability related to exposure of sensitive serialized user authentication information.
Users of Jenkins Support Core Plugin version 2.72 and earlier may be impacted by CVE-2021-21621.