First published: Wed Apr 21 2021(Updated: )
Jenkins Templating Engine Plugin 2.1 and earlier does not protect its pipeline configurations using Script Security Plugin, allowing attackers with Job/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Templating Engine | <=2.1 | |
maven/org.jenkins-ci.plugins:templating-engine | <=2.1 | 2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21646 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2021-21646, upgrade the Jenkins Templating Engine Plugin to version 2.2 or later.
CVE-2021-21646 affects users of Jenkins Templating Engine Plugin version 2.1 and earlier who have Job/Configure permissions.
Attackers with Job/Configure permissions can execute arbitrary code on the Jenkins controller JVM due to CVE-2021-21646.
CVE-2021-21646 was published on April 21, 2021.