Latest CVE Feed
-
9.8
CRITICALCVE-2021-21696
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted libra... Read more
Affected Products : jenkins- EPSS Score: %1.53
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21695
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.... Read more
Affected Products : jenkins- EPSS Score: %0.68
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21694
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.... Read more
Affected Products : jenkins- EPSS Score: %0.33
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21693
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.... Read more
Affected Products : jenkins- EPSS Score: %1.30
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21692
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.... Read more
Affected Products : jenkins- EPSS Score: %0.61
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21691
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.... Read more
Affected Products : jenkins- EPSS Score: %0.60
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21690
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.... Read more
Affected Products : jenkins- EPSS Score: %0.65
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-21689
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.... Read more
Affected Products : jenkins- EPSS Score: %2.71
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-21688
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePat... Read more
Affected Products : jenkins- EPSS Score: %0.33
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-21687
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.... Read more
Affected Products : jenkins- EPSS Score: %0.30
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-21686
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.... Read more
Affected Products : jenkins- EPSS Score: %0.35
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-21685
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.... Read more
Affected Products : jenkins- EPSS Score: %0.26
- Published: Nov. 04, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-21684
Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.... Read more
Affected Products : git- EPSS Score: %0.21
- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21683
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Worksp... Read more
- EPSS Score: %0.66
- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21682
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.... Read more
- EPSS Score: %0.58
- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-21681
Jenkins Nomad Plugin 0.7.4 and earlier stores Docker passwords unencrypted in the global config.xml file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.... Read more
Affected Products : nomad- EPSS Score: %0.02
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-21680
Jenkins Nested View Plugin 1.20 and earlier does not configure its XML transformer to prevent XML external entity (XXE) attacks.... Read more
Affected Products : nested_view- EPSS Score: %0.41
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21679
Jenkins Azure AD Plugin 179.vf6841393099e and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.... Read more
Affected Products : azure_ad- EPSS Score: %0.02
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21678
Jenkins SAML Plugin 2.0.7 and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.... Read more
Affected Products : saml- EPSS Score: %0.06
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21677
Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.... Read more
Affected Products : code_coverage_api- EPSS Score: %2.58
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024