First published: Wed Oct 06 2021(Updated: )
The file browser for workspaces, archived artifacts, and `userContent/` in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows. This results in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.\n\nThe file browser in Jenkins 2.315, LTS 2.303.2 refuses to serve files that would be considered absolute paths.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.303.1 | |
Jenkins Jenkins | <=2.314 | |
Microsoft Windows | ||
maven/org.jenkins-ci.main:jenkins-core | >=2.304<=2.314 | 2.315 |
maven/org.jenkins-ci.main:jenkins-core | <=2.303.1 | 2.303.2 |
All of | ||
Any of | ||
Jenkins Jenkins | <=2.303.1 | |
Jenkins Jenkins | <=2.314 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-21683.
The severity of CVE-2021-21683 is medium with a CVSS score of 6.5.
The affected software is Jenkins versions 2.314 and earlier, LTS 2.313.1 and earlier.
The CWE ID for CVE-2021-21683 is CWE-22.
Attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) can exploit this vulnerability to obtain unauthorized access to files.