First published: Thu Nov 04 2021(Updated: )
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <2.303.3 | |
Jenkins Jenkins | <2.319 | |
redhat/jenkins | <2.319 | 2.319 |
redhat/jenkins LTS | <2.303.3 | 2.303.3 |
maven/org.jenkins-ci.main:jenkins-core | <=2.303.2 | 2.303.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.304<=2.318 | 2.319 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21694 is a vulnerability that affects Jenkins versions 2.318 and earlier, as well as LTS 2.303.2 and earlier. It allows unauthorized access to file paths and does not check permissions.
Jenkins versions 2.318 and earlier, and LTS 2.303.2 and earlier are affected by CVE-2021-21694.
CVE-2021-21694 has a severity rating of 9.8 (critical).
To fix CVE-2021-21694, it is recommended to update Jenkins to version 2.319 or LTS 2.303.3, which include the necessary security patches.
More information about CVE-2021-21694 can be found in the Jenkins security advisory: https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455