First published: Thu Nov 04 2021(Updated: )
File path filters do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2.319 | 2.319 |
redhat/jenkins LTS | <2.303.3 | 2.303.3 |
Jenkins Jenkins | <2.303.3 | |
Jenkins Jenkins | <2.319 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.304<=2.318 | 2.319 |
maven/org.jenkins-ci.main:jenkins-core | <2.303.2 | 2.303.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21686 is a vulnerability in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier, which allows operations to follow symbolic links to outside allowed directories.
CVE-2021-21686 allows attackers to exploit file path filters in Jenkins, potentially leading to unauthorized access to sensitive information or remote code execution.
CVE-2021-21686 has a severity rating of 8.1 (high).
Yes, the fix for CVE-2021-21686 is available in Jenkins version 2.319 and Jenkins LTS version 2.303.3.
You can find more information about CVE-2021-21686 on the Jenkins Security Advisory page (https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455) and the Red Hat Errata pages (https://access.redhat.com/errata/RHSA-2021:4833, https://access.redhat.com/errata/RHSA-2021:4829).