Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-21696

Опубликовано: 04 нояб. 2021
Источник: debian

Описание

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

Связанные уязвимости

CVSS3: 9
redhat
больше 4 лет назад

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

CVSS3: 9.8
nvd
больше 4 лет назад

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

CVSS3: 8.8
github
больше 3 лет назад

Agent-to-controller access control allowed writing to sensitive directory used by Jenkins Pipeline: Shared Groovy Libraries Plugin

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость реализации интерфейса FilePath API сервера автоматизации Jenkins, позволяющая нарушителю выполнить произвольный код