7.5
CVSSv2

CVE-2021-21690

Published: 04/11/2021 Updated: 22/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and previous versions, LTS 2.303.2 and previous versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins jenkins

Vendor Advisories

A security issue has been found in Jenkins before version 2319 Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path This allows agent processes to read and write arbitrary files on the Jenkins controller file system, and obtain some information about Jenkins controller file system ...