CVE-2021-21692
- EPSS 0.48%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
CVE-2021-21693
- EPSS 1.41%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21694
- EPSS 0.43%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21695
- EPSS 0.39%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:51
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21696
- EPSS 0.99%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:51
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted ...
CVE-2021-21697
- EPSS 0.86%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:51
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
CVE-2021-21685
- EPSS 0.29%
- Veröffentlicht 04.11.2021 17:15:07
- Zuletzt bearbeitet 21.11.2024 05:48:49
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
CVE-2021-21682
- EPSS 0.42%
- Veröffentlicht 06.10.2021 23:15:06
- Zuletzt bearbeitet 21.11.2024 05:48:49
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
CVE-2021-21683
- EPSS 1.4%
- Veröffentlicht 06.10.2021 23:15:06
- Zuletzt bearbeitet 21.11.2024 05:48:49
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/W...
CVE-2021-21670
- EPSS 0.65%
- Veröffentlicht 30.06.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:48
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.