First published: Tue Aug 31 2021(Updated: )
An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs. SAML Plugin implements this extension point for the URL that users are redirected to after login. In Jenkins SAML Plugin 2.0.7 and earlier this implementation is too permissive, allowing attackers to craft URLs that would bypass the CSRF protection of any target URL.\n\nThis vulnerability was originally introduced in Jenkins SAML Plugin 1.1.3. Jenkins SAML Plugin 2.0.8 restricts which URLs it disables cross-site request forgery (CSRF) protection for to the one URL that needs it.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Saml | >=1.1.3<=2.0.7 | |
maven/org.jenkins-ci.plugins:saml | <=2.0.7 | 2.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21678 is a vulnerability in Jenkins SAML Plugin 2.0.7 and earlier that allows attackers to bypass CSRF protection.
An attacker can exploit CVE-2021-21678 by crafting URLs that bypass CSRF protection.
CVE-2021-21678 has a severity rating of 8.8 (high).
To fix CVE-2021-21678, upgrade Jenkins SAML Plugin to version 2.0.8 or later.
You can find more information about CVE-2021-21678 at the following references: [1] [2] [3].