First published: Thu Mar 18 2021(Updated: )
A flaw was found in Jenkins Matrix Authorization Strategy Plugin. The jenkins plugin does not correctly perform permission checks, as consequences this allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders. The highest threat from this vulnerability is to data confidentiality.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/matrix-auth | <2.6.6 | 2.6.6 |
redhat/jenkins | <0:2.289.1.1624020353-1.el8 | 0:2.289.1.1624020353-1.el8 |
Jenkins Matrix Authorization Strategy | <=2.6.5 | |
maven/org.jenkins-ci.plugins:matrix-auth | <=2.6.5 | 2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21623 has been classified as a medium severity vulnerability due to improper permission checks in the Jenkins Matrix Authorization Strategy Plugin.
To fix CVE-2021-21623, upgrade the Jenkins Matrix Authorization Strategy Plugin to version 2.6.6 or higher.
The impact of CVE-2021-21623 allows attackers with Item/Read permission on nested items to access them without having Item/Read permission for parent folders.
CVE-2021-21623 affects versions of Jenkins Matrix Authorization Strategy Plugin up to and including 2.6.5.
Yes, CVE-2021-21623 specifically impacts installations of Jenkins that use the Matrix Authorization Strategy Plugin.