Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-3513 Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
Github GHSA Github GHSA GHSA-c5r9-rx53-q3gf Agent-to-controller access control allowed writing to sensitive directory used by Jenkins Pipeline: Shared Groovy Libraries Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T18:23:29.397Z

Reserved: 2021-01-04T00:00:00

Link: CVE-2021-21696

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-04T17:15:08.873

Modified: 2024-11-21T05:48:51.160

Link: CVE-2021-21696

cve-icon Redhat

Severity : Important

Publid Date: 2021-11-04T14:20:00Z

Links: CVE-2021-21696 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses