CVE-2021-21687
- EPSS 0.27%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
CVE-2021-21688
- EPSS 0.35%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, Fi...
CVE-2021-21689
- EPSS 0.81%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21690
- EPSS 0.5%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21691
- EPSS 0.64%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21692
- EPSS 0.65%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
CVE-2021-21693
- EPSS 0.51%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21694
- EPSS 0.29%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:50
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21695
- EPSS 0.75%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:51
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21696
- EPSS 0.95%
- Veröffentlicht 04.11.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:48:51
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted ...