Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-21690

Опубликовано: 04 нояб. 2021
Источник: redhat
CVSS3: 9
EPSS Низкий

Описание

Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

A file path filtering bypass vulnerability was found in Jenkins. Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path. This may allow an attacker who controls the agent process to get read and write access to arbitrary files on the Jenkins controller file system.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7jenkinsNot affected
Red Hat OpenShift Container Platform 3.11jenkinsFixedRHSA-2021:482702.12.2021
Red Hat OpenShift Container Platform 4.6jenkinsFixedRHSA-2021:479902.12.2021
Red Hat OpenShift Container Platform 4.7jenkinsFixedRHSA-2021:480101.12.2021
Red Hat OpenShift Container Platform 4.8jenkinsFixedRHSA-2021:482930.11.2021
Red Hat OpenShift Container Platform 4.9jenkinsFixedRHSA-2021:483329.11.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2020336jenkins: Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path

EPSS

Процентиль: 66%
0.00504
Низкий

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVSS3: 9.8
debian
больше 4 лет назад

Agent processes are able to completely bypass file path filtering by w ...

CVSS3: 9
github
больше 3 лет назад

Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость сервера автоматизации Jenkins, связанная с нарушением механизма защиты данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 66%
0.00504
Низкий

9 Critical

CVSS3