First published: Wed Jun 30 2021(Updated: )
Jenkins CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cas | <=1.6.0 | |
maven/org.jenkins-ci.plugins:cas-plugin | <=1.6.0 | 1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21673 has a medium severity rating due to its potential use in phishing attacks.
To remediate CVE-2021-21673, upgrade the Jenkins CAS Plugin to version 1.6.1 or later.
CVE-2021-21673 affects Jenkins CAS Plugin versions 1.6.0 and earlier.
CVE-2021-21673 enables attackers to perform phishing attacks by improperly validating redirect URLs after login.
Yes, CVE-2021-21673 is a security vulnerability specific to the Jenkins CAS Plugin.