First published: Thu Nov 04 2021(Updated: )
FilePath#unzip and FilePath#untar were not subject to any access control.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <2.303.3 | |
Jenkins Jenkins | <2.319 | |
redhat/jenkins | <2.319 | 2.319 |
redhat/jenkins LTS | <2.303.3 | 2.303.3 |
maven/org.jenkins-ci.main:jenkins-core | <2.303.3 | 2.303.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.304<=2.318 | 2.319 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21689 is a vulnerability in Jenkins that allows unauthenticated remote attackers to access Jenkins agents.
CVE-2021-21689 has a severity level of critical (9.1).
Jenkins versions up to and including 2.318 and LTS versions up to and including 2.303.2 are affected by CVE-2021-21689.
To fix CVE-2021-21689, you need to upgrade to Jenkins version 2.319 or LTS version 2.303.3 or higher.
You can find more information about CVE-2021-21689 in the Jenkins security advisory and the Red Hat security advisories.