First published: Wed Apr 21 2021(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Config File Provider Plugin 3.7.0 and earlier allows attackers to delete configuration files corresponding to an attacker-specified ID.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1624366838-1.el7 | 2-plugins-0:3.11.1624366838-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1623326336-1.el7 | 2-plugins-0:4.5.1623326336-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1623162648-1.el8 | 2-plugins-0:4.6.1623162648-1.el8 |
redhat/cri-o | <0:1.20.2-12.rhaos4.7.git9f7be76.el8 | 0:1.20.2-12.rhaos4.7.git9f7be76.el8 |
redhat/cri-tools | <0:1.20.0-3.el7 | 0:1.20.0-3.el7 |
redhat/jenkins | <2-plugins-0:4.7.1621361158-1.el8 | 2-plugins-0:4.7.1621361158-1.el8 |
redhat/redhat-release-coreos | <0:47.83-2.el8 | 0:47.83-2.el8 |
Jenkins Config File Provider | <=3.7.0 | |
maven/org.jenkins-ci.plugins:config-file-provider | <=3.7.0 | 3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-21644 is a cross-site request forgery (CSRF) vulnerability in Jenkins Config File Provider Plugin 3.7.0 and earlier.
CVE-2021-21644 has a severity of 6.3 (medium).
CVE-2021-21644 allows attackers to delete configuration files corresponding to an attacker-specified ID.
The remedy for CVE-2021-21644 in Jenkins Config File Provider Plugin is to update to version 3.7.1 or later.
More information about CVE-2021-21644 can be found at the following references: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2018-09-25/#SECURITY-938), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2021:2122), [Red Hat CVE](https://access.redhat.com/security/cve/cve-2021-21644)