First published: Thu Mar 18 2021(Updated: )
An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Role-based Authorization Strategy | <=3.1 | |
maven/org.jenkins-ci.plugins:role-strategy | <=3.1 | 3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21624 is considered a medium-severity vulnerability due to the improper permission checks that can lead to unauthorized access to nested items.
To fix CVE-2021-21624, upgrade the Jenkins Role-based Authorization Strategy Plugin to version 3.1.1 or later.
The vulnerability occurs due to an incorrect permission check that allows users with Item/Read permission on nested items to access items in parent folders without proper permission.
CVE-2021-21624 affects items organized hierarchically in Jenkins, such as jobs and folders.
No, CVE-2021-21624 is not exploitable in the latest versions if the Role-based Authorization Strategy Plugin has been updated to the fixed version.