First published: Wed Oct 06 2021(Updated: )
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.303.1 | |
Jenkins Jenkins | <=2.314 | |
Microsoft Windows | ||
maven/org.jenkins-ci.main:jenkins-core | <=2.303.1 | 2.303.2 |
maven/org.jenkins-ci.main:jenkins-core | >=2.304<=2.314 | 2.315 |
All of | ||
Any of | ||
Jenkins Jenkins | <=2.303.1 | |
Jenkins Jenkins | <=2.314 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-21682.
The severity of CVE-2021-21682 is medium (4.3).
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier are affected by this vulnerability.
The vulnerability in Jenkins allows for the acceptance of names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
You can find more information about CVE-2021-21682 on the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2021/10/06/1), [Reference 2](https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424).