CVE-2021-21688
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2021-21688. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
Available Exploits
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
GHSA-m9hr-259f-2v23Advisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: December 16, 2022