First published: Thu Nov 04 2021(Updated: )
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <2.303.3 | |
Jenkins Jenkins | <2.319 | |
redhat/jenkins | <2.319 | 2.319 |
redhat/jenkins LTS | <2.303.3 | 2.303.3 |
maven/org.jenkins-ci.main:jenkins-core | <=2.303.2 | 2.303.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.304<=2.318 | 2.319 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21690 is a vulnerability that allows agent processes to bypass file path filtering in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21690 has a severity level of 9.8 (Critical).
The CVE-2021-21690 vulnerability can be fixed by updating Jenkins to version 2.319 or Jenkins LTS to version 2.303.3.
You can find more information about CVE-2021-21690 on the Jenkins security advisory page (https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455) and the Red Hat errata pages (https://access.redhat.com/errata/RHSA-2021:4833, https://access.redhat.com/errata/RHSA-2021:4829).
The CWE for CVE-2021-21690 is CWE-693.