7.5
CVSSv2

CVE-2021-21696

Published: 04/11/2021 Updated: 22/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Jenkins 2.318 and previous versions, LTS 2.303.2 and previous versions does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins jenkins

Vendor Advisories

Jenkins before version 2319 does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs This directory is used by the "Pipeline: Shared Groovy Libraries" Plugin to store copies of shared libraries This allows attackers in control of agent processes to replace the code of a trusted library ...