Description
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3313 | Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. |
Github GHSA |
GHSA-97c3-w9cr-6qc2 | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:23:27.487Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21690
No data.
Status : Modified
Published: 2021-11-04T17:15:08.553
Modified: 2024-11-21T05:48:50.480
Link: CVE-2021-21690
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA