CVE-2021-21602
UNKNOWN
Published 2021-01-13T15:55:27
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2021-21602. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
✓ GitHub Reviewed
MODERATE
Arbitrary file read vulnerability in workspace browsers in Jenkins
GHSA-vpjm-58cw-r8q5Advisory Details
The file browser for workspaces, archived artifacts, and `$JENKINS_HOME/userContent/` follows symbolic links to locations outside the directory being browsed in Jenkins 2.274 and earlier, LTS 2.263.1 and earlier.
This allows attackers with Job/Workspace permission and the ability to control workspace contents (e.g., with Job/Configure permission or the ability to change SCM contents) to create symbolic links that allow them to access files outside workspaces using the workspace browser.
This issue is caused by an incomplete fix for SECURITY-904 / CVE-2018-1000862 in the [2018-12-08 security advisory](https://www.jenkins.io/security/advisory/2018-12-05/#SECURITY-904).
Jenkins 2.275, LTS 2.263.2 no longer supports symlinks in workspace browsers. While they may still exist on the file system, they are no longer shown on the UI, accessible via URLs, or included in directory content downloads.
This fix only changes the behavior of the Jenkins UI. Archiving artifacts still behaves as before.
Affected Packages
Maven
org.jenkins-ci.main:jenkins-core
ECOSYSTEM:
≥0
<2.263.2
Maven
org.jenkins-ci.main:jenkins-core
ECOSYSTEM:
≥2.264
<2.275
CVSS Scoring
CVSS Score
5.0
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: December 13, 2022
Published: 2021-01-13T15:55:27
Last Modified: 2024-08-03T18:16:23.643Z
Copied to clipboard!