CVE-2021-21602Link Following in Project Jenkins

Severity
6.5MEDIUMNVD
GHSA4.3OSV4.3
EPSS
1.4%
top 19.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateMay 24

Description

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDjenkins/jenkins2.263.1+1
CVEListV5jenkins_project/jenkinsunspecified2.274+1

🔴Vulnerability Details

4
GHSA
Arbitrary file read vulnerability in workspace browsers in Jenkins2022-05-24
OSV
Arbitrary file read vulnerability in workspace browsers in Jenkins2022-05-24
GHSA
Time-of-check Time-of-use (TOCTOU) Race Condition in Jenkins2022-05-24
CVEList
CVE-2021-21602: Jenkins 22021-01-13

📋Vendor Advisories

3
Jenkins
Jenkins Security Advisory 2021-01-262021-01-26
Jenkins
Jenkins Security Advisory 2021-01-132021-01-13
Red Hat
jenkins: Arbitrary file read vulnerability in workspace browsers2021-01-13
CVE-2021-21602 — Link Following in Project Jenkins | cvebase