First published: Wed Apr 21 2021(Updated: )
A flaw was found in the config-file-provider Jenkins plugin. The plugin does not correctly perform permission checks in several HTTP endpoints, as a consequence an attacker with global Job/Configure permission can enumerate system-scoped credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1624366838-1.el7 | 2-plugins-0:3.11.1624366838-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1623326336-1.el7 | 2-plugins-0:4.5.1623326336-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1623162648-1.el8 | 2-plugins-0:4.6.1623162648-1.el8 |
redhat/cri-o | <0:1.20.2-12.rhaos4.7.git9f7be76.el8 | 0:1.20.2-12.rhaos4.7.git9f7be76.el8 |
redhat/cri-tools | <0:1.20.0-3.el7 | 0:1.20.0-3.el7 |
redhat/jenkins | <2-plugins-0:4.7.1621361158-1.el8 | 2-plugins-0:4.7.1621361158-1.el8 |
redhat/redhat-release-coreos | <0:47.83-2.el8 | 0:47.83-2.el8 |
Jenkins Config File Provider | <=3.7.0 | |
maven/org.jenkins-ci.plugins:config-file-provider | <=3.7.0 | 3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-21643.
The severity of CVE-2021-21643 is medium with a CVSS score of 6.5.
CVE-2021-21643 affects Jenkins Config File Provider Plugin version 3.7.0 and earlier.
An attacker with global Job/Configure permission can exploit CVE-2021-21643 to enumerate system-scoped credentials IDs stored in Jenkins.
To remediate CVE-2021-21643, upgrade to Jenkins Config File Provider Plugin version 3.7.1 or later.