Filtered by vendor Jenkins Subscriptions
Filtered by product Jenkins Subscriptions
Total 246 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-28165 5 Eclipse, Jenkins, Netapp and 2 more 28 Jetty, Jenkins, Cloud Manager and 25 more 2024-08-03 7.5 High
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
CVE-2021-21685 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
CVE-2021-21693 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21696 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
CVE-2021-21686 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 8.1 High
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
CVE-2021-21694 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21697 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
CVE-2021-21683 2 Jenkins, Microsoft 2 Jenkins, Windows 2024-08-03 6.5 Medium
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.
CVE-2021-21695 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 8.8 High
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21687 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
CVE-2021-21688 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 7.5 High
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
CVE-2021-21682 2 Jenkins, Microsoft 2 Jenkins, Windows 2024-08-03 4.3 Medium
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
CVE-2021-21670 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 4.3 Medium
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
CVE-2021-21689 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21691 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21692 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
CVE-2021-21690 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21671 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 7.5 High
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
CVE-2021-21639 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 4.3 Medium
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
CVE-2021-21640 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 4.3 Medium
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.