Severity
9.8CRITICAL
EPSS
1.0%
top 23.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateMay 24

Description

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Mavenorg.jenkins-ci.main:jenkins-core2.3042.319+1
NVDjenkins/jenkins2.303.2+1
CVEListV5jenkins_project/jenkinsunspecified2.318+1

🔴Vulnerability Details

4
OSV
Agent-to-controller access control allowed writing to sensitive directory used by Jenkins Pipeline: Shared Groovy Libraries Plugin2022-05-24
GHSA
Agent-to-controller access control allowed writing to sensitive directory used by Jenkins Pipeline: Shared Groovy Libraries Plugin2022-05-24
GHSA
Username spoofing in OnionShare2022-01-21
CVEList
CVE-2021-21696: Jenkins 22021-11-04

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2021-11-042021-11-04
Red Hat
jenkins: Agent-to-controller access control allowed writing to sensitive directory used by Pipeline: Shared Groovy Libraries Plugin2021-11-04
CVE-2021-21696 (CRITICAL CVSS 9.8) | Jenkins 2.318 and earlier | cvebase.io