Filtered by vendor Redhat Subscriptions
Filtered by product Openshift Subscriptions
Total 931 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-21697 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
CVE-2021-21684 2 Jenkins, Redhat 2 Git, Openshift 2024-08-03 6.1 Medium
Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.
CVE-2021-21695 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 8.8 High
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21687 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
CVE-2021-21688 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 7.5 High
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
CVE-2021-21670 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 4.3 Medium
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
CVE-2021-21689 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.1 Critical
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21691 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21692 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
CVE-2021-21690 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 9.8 Critical
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21698 2 Jenkins, Redhat 2 Subversion, Openshift 2024-08-03 7.5 High
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
CVE-2021-21671 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 7.5 High
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
CVE-2021-21648 2 Jenkins, Redhat 2 Credentials, Openshift 2024-08-03 6.1 Medium
Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability.
CVE-2021-21639 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 4.3 Medium
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
CVE-2021-21643 2 Jenkins, Redhat 3 Config File Provider, Openshift, Rhmt 2024-08-03 6.5 Medium
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.
CVE-2021-21642 2 Jenkins, Redhat 3 Config File Provider, Openshift, Rhmt 2024-08-03 8.1 High
Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2021-21623 2 Jenkins, Redhat 2 Matrix Authorization Strategy, Openshift 2024-08-03 6.5 Medium
An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
CVE-2021-21645 2 Jenkins, Redhat 3 Config File Provider, Openshift, Rhmt 2024-08-03 4.3 Medium
Jenkins Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints, attackers with Overall/Read permission to enumerate configuration file IDs.
CVE-2021-21640 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 4.3 Medium
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.
CVE-2021-21607 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-08-03 6.5 Medium
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.