First published: Thu Jun 10 2021(Updated: )
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin 7.5.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Xebialabs Xl Deploy | <=7.5.8 | |
maven/com.xebialabs.deployit.ci:deployit-plugin | <=10.0.1 | 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21663 is a vulnerability in Jenkins XebiaLabs XL Deploy Plugin 7.5.8 and earlier that allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
CVE-2021-21663 has a severity rating of medium with a CVSS score of 4.3.
CVE-2021-21663 allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials, potentially compromising the security of Jenkins XebiaLabs XL Deploy Plugin.
To mitigate CVE-2021-21663, it is recommended to upgrade to version 10.0.2 of the Jenkins XebiaLabs XL Deploy Plugin or a later version.
You can find more information about CVE-2021-21663 in the following references: [Openwall](http://www.openwall.com/lists/oss-security/2021/06/10/14), [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982), and [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-21663).