First published: Wed Jun 30 2021(Updated: )
Incorrect Authorization vulnerability was found in Jenkins. Users with Item/Cancel permission are able to cancel queue items and abort builds of jobs even when they do not have Item/Read permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.289.2.1629437819-1.el8 | 0:2.289.2.1629437819-1.el8 |
redhat/jenkins | <0:2.289.2.1628252553-1.el8 | 0:2.289.2.1628252553-1.el8 |
redhat/jenkins | <0:2.289.3.1633554819-1.el8 | 0:2.289.3.1633554819-1.el8 |
Jenkins Jenkins | <2.289.2 | |
Jenkins Jenkins | <2.300 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.292<=2.299 | 2.300 |
maven/org.jenkins-ci.main:jenkins-core | <=2.289.1 | 2.289.2 |
As a workaround on earlier versions of Jenkins, do not grant Item/Cancel permission to users who do not have Item/Read permission.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this Jenkins vulnerability is CVE-2021-21670.
The severity of CVE-2021-21670 is medium.
CVE-2021-21670 allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission, even without Item/Read permission.
To fix CVE-2021-21670 in Jenkins, update to version 2.289.2 or later for Jenkins LTS or version 2.300 or later for Jenkins.
More information about CVE-2021-21670 can be found at the following references: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278), [Openwall Mailing List](http://www.openwall.com/lists/oss-security/2021/06/30/1), [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2021:3820).