Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5032 | Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator. |
Github GHSA |
GHSA-qv6f-rcv6-6q3x | Improper handling of REST API XML deserialization errors in Jenkins |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:16:23.595Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21604
No data.
Status : Modified
Published: 2021-01-13T16:15:13.523
Modified: 2024-11-21T05:48:41.053
Link: CVE-2021-21604
OpenCVE Enrichment
No data.
EUVD
Github GHSA