First published: Tue Mar 30 2021(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Team Foundation Server | <=5.157.1 | |
maven/org.jenkins-ci.plugins:tfs | <=5.157.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21638 is a cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier.
CVE-2021-21638 allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Jenkins Team Foundation Server Plugin versions up to and including 5.157.1 are affected.
CVE-2021-21638 has a severity rating of 8.8 (high).
To fix CVE-2021-21638, it is recommended to upgrade Jenkins Team Foundation Server Plugin to a version beyond 5.157.1.