Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-21639

Опубликовано: 07 апр. 2021
Источник: debian
EPSS Низкий

Описание

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 76%
0.00942
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
почти 5 лет назад

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.

CVSS3: 3.1
redhat
почти 5 лет назад

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.

CVSS3: 4.3
nvd
почти 5 лет назад

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.

CVSS3: 4.3
github
больше 3 лет назад

Lack of type validation in agent related REST API in Jenkins

EPSS

Процентиль: 76%
0.00942
Низкий