Description
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3313 | Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. |
Github GHSA |
GHSA-97c3-w9cr-6qc2 | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:23:27.487Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21690
No data.
Status : Modified
Published: 2021-11-04T17:15:08.553
Modified: 2024-11-21T05:48:50.480
Link: CVE-2021-21690
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA