First published: Tue Mar 30 2021(Updated: )
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Team Foundation Server | <=5.157.1 | |
maven/org.jenkins-ci.plugins:tfs | <=5.157.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21637 is a vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier that allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2021-21637 has a severity rating of 6.5 out of 10, which is considered medium.
Jenkins Team Foundation Server Plugin versions up to and including 5.157.1 are affected by CVE-2021-21637.
An attacker with Overall/Read permission can exploit CVE-2021-21637 by connecting to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Yes, you can find more information about CVE-2021-21637 at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2021/03/30/1), [Reference 2](https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2))