Show filters
288 Total Results
Displaying 81-90 of 288
Sort by:
Attacker Value
Unknown
CVE-2021-21694
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
0
Attacker Value
Unknown
CVE-2021-21687
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
0
Attacker Value
Unknown
CVE-2021-21690
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
0
Attacker Value
Unknown
CVE-2021-21692
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
0
Attacker Value
Unknown
CVE-2021-21686
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
0
Attacker Value
Unknown
CVE-2021-21685
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
0
Attacker Value
Unknown
CVE-2021-21688
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
0
Attacker Value
Unknown
CVE-2021-21689
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
0
Attacker Value
Unknown
CVE-2021-21683
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.
0
Attacker Value
Unknown
CVE-2021-21682
Disclosure Date: October 06, 2021 (last updated October 26, 2023)
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
0