Miggo Logo

CVE-2021-21692: Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.64022%
Published
5/24/2022
Updated
12/18/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven>= 2.304, <= 2.3182.319
org.jenkins-ci.main:jenkins-coremaven<= 2.303.22.303.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly names FilePath#renameTo and FilePath#moveAllChildrenTo as operations that only checked read permissions pre-patch. The security advisory states these operations should check both read and delete permissions, and the CVE description confirms improper authorization (CWE-863) in these file operations. The commit message [SECURITY-2455] references changes to FilePath.java where these methods are defined, and the patch notes specifically mention adding delete permission checks to these operations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** ***nt-to-*ontroll*r s**urity su*syst*m limits w*i** *il*s on t** J*nkins *ontroll*r **n ** ****ss** *y ***nt pro**ss*s. Multipl* vuln*r**iliti*s in t** *il* p*t* *ilt*rin* impl*m*nt*tion o* J*nkins *.*** *n* **rli*r, LTS *.***.* *n* **rli*r *llo

Reasoning

T** vuln*r**ility **s*ription *xpli*itly n*m*s `*il*P*t*#r*n*m*To` *n* `*il*P*t*#mov**ll**il*r*nTo` *s op*r*tions t**t only ****k** r*** p*rmissions pr*-p*t**. T** s**urity **visory st*t*s t**s* op*r*tions s*oul* ****k *ot* r*** *n* **l*t* p*rmission