Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3313 | Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. |
Github GHSA |
GHSA-97c3-w9cr-6qc2 | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:23:27.487Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21690
No data.
Status : Modified
Published: 2021-11-04T17:15:08.553
Modified: 2024-11-21T05:48:50.480
Link: CVE-2021-21690
OpenCVE Enrichment
No data.
EUVD
Github GHSA