Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-21686

Опубликовано: 04 нояб. 2021
Источник: redhat
CVSS3: 9
EPSS Низкий

Описание

File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.

A link following vulnerability was found in Jenkins. The file path filters do not canonicalize paths allowing operations to follow symbolic links to directories they are not supposed to have access to. This may allow an attacker to read and write arbitrary files on the Jenkins controller file system.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7jenkinsNot affected
Red Hat OpenShift Container Platform 3.11jenkinsFixedRHSA-2021:482702.12.2021
Red Hat OpenShift Container Platform 4.6jenkinsFixedRHSA-2021:479902.12.2021
Red Hat OpenShift Container Platform 4.7jenkinsFixedRHSA-2021:480101.12.2021
Red Hat OpenShift Container Platform 4.8jenkinsFixedRHSA-2021:482930.11.2021
Red Hat OpenShift Container Platform 4.9jenkinsFixedRHSA-2021:483329.11.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=2020323jenkins: File path filters do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories

EPSS

Процентиль: 51%
0.00278
Низкий

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 4 лет назад

File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.

CVSS3: 8.1
debian
больше 4 лет назад

File path filters in the agent-to-controller security subsystem of Jen ...

CVSS3: 9
github
больше 3 лет назад

Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость подсистемы agent-to-controller сервера автоматизации Jenkins, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 51%
0.00278
Низкий

9 Critical

CVSS3