Jenkins

Jenkins

256 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.27%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.

  • EPSS 0.35%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, Fi...

  • EPSS 0.81%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

  • EPSS 0.5%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

  • EPSS 0.64%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

  • EPSS 0.65%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.

  • EPSS 0.51%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

  • EPSS 0.29%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

  • EPSS 0.75%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:51

FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

  • EPSS 0.95%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:51

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted ...