First published: Wed Apr 21 2021(Updated: )
Jenkins CloudBees CD Plugin 1.1.21 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Item/Read permission to schedule builds of projects without having Item/Build permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cloudbees Cd | <=1.1.21 | |
maven/org.jenkins-ci.plugins:electricflow | >=1.1.19<1.1.22 | 1.1.22 |
maven/org.jenkins-ci.plugins:electricflow | <1.1.18.1 | 1.1.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-21647 is medium with a severity value of 4.3.
CVE-2021-21647 allows attackers with Item/Read permission to schedule builds of projects without having Item/Build permission in Jenkins CloudBees CD Plugin.
The remedy for CVE-2021-21647 is to update Jenkins CloudBees CD Plugin to version 1.1.22.
You can find more information about CVE-2021-21647 on the NIST National Vulnerability Database (NVD) website and the Jenkins security advisory.
The CWE ID for CVE-2021-21647 is 862.