Miggo Logo

CVE-2021-21686: Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.43014%
Published
5/24/2022
Updated
12/7/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven< 2.303.22.303.3
org.jenkins-ci.main:jenkins-coremaven>= 2.304, <= 2.3182.319

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (CVE-2021-21686) stems from improper path canonicalization in Jenkins' agent-to-controller file access controls. The provided commit diffs and advisory indicate that path filters did not resolve symbolic links, allowing traversal. Key functions like SoloFilePathFilter.normalize (using non-canonical paths), FilePathRuleConfig.checkFileAccess (using raw paths), and SoloFilePathFilter.mkdirs (incomplete parent checks) were modified in fixes to enforce canonicalization. These functions directly handled path validation and were the focus of security patches, confirming their role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** ***nt-to-*ontroll*r s**urity su*syst*m limits w*i** *il*s on t** J*nkins *ontroll*r **n ** ****ss** *y ***nt pro**ss*s. Multipl* vuln*r**iliti*s in t** *il* p*t* *ilt*rin* impl*m*nt*tion o* J*nkins *.*** *n* **rli*r, LTS *.***.* *n* **rli*r *llo

Reasoning

T** vuln*r**ility (*V*-****-*****) st*ms *rom improp*r p*t* **noni**liz*tion in J*nkins' ***nt-to-*ontroll*r *il* ****ss *ontrols. T** provi*** *ommit *i**s *n* **visory in*i**t* t**t p*t* *ilt*rs *i* not r*solv* sym*oli* links, *llowin* tr*v*rs*l. K