Bug 2020345 (CVE-2021-21697) - CVE-2021-21697 jenkins: Agent-to-controller access control allows reading/writing most content of build directories
Summary: CVE-2021-21697 jenkins: Agent-to-controller access control allows reading/wri...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-21697
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2020611 2020612 2020613 2020614 2020615 2020616
Blocks: 2020347
TreeView+ depends on / blocked
 
Reported: 2021-11-04 16:04 UTC by Michael Kaplan
Modified: 2022-03-08 12:14 UTC (History)
20 users (show)

Fixed In Version: jenkins 2.319, jenkins LTS 2.303.3
Doc Type: If docs needed, set a value
Doc Text:
An incorrect access restriction vulnerability was found in Jenkins. The directories agents are allowed to access include the directories where there are stored build-related information intended to allow agents to store build-related metadata during build execution. As a consequence, this allows an attacker who controls agent process to read and write the contents of any build directory stored in Jenkins with very few restrictions (build.xml and some Pipeline-related metadata).
Clone Of:
Environment:
Last Closed: 2021-12-02 23:10:37 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4799 0 None None None 2021-12-02 18:35:14 UTC
Red Hat Product Errata RHSA-2021:4801 0 None None None 2021-12-01 12:26:17 UTC
Red Hat Product Errata RHSA-2021:4827 0 None None None 2021-12-02 22:01:17 UTC
Red Hat Product Errata RHSA-2021:4829 0 None None None 2021-11-30 09:09:32 UTC
Red Hat Product Errata RHSA-2021:4833 0 None None None 2021-11-29 10:37:28 UTC

Description Michael Kaplan 2021-11-04 16:04:42 UTC
Agents are allowed some limited access to files on the Jenkins controller file system. The directories agents are allowed to access in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier include the directories storing build-related information, intended to allow agents to store build-related metadata during build execution. As a consequence, this allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions (build.xml and some Pipeline-related metadata).

Comment 1 Michael Kaplan 2021-11-04 16:27:13 UTC
Reference:

https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2428

Comment 5 errata-xmlrpc 2021-11-29 10:37:26 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.9

Via RHSA-2021:4833 https://access.redhat.com/errata/RHSA-2021:4833

Comment 6 errata-xmlrpc 2021-11-30 09:09:31 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.8

Via RHSA-2021:4829 https://access.redhat.com/errata/RHSA-2021:4829

Comment 7 errata-xmlrpc 2021-12-01 12:26:15 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.7

Via RHSA-2021:4801 https://access.redhat.com/errata/RHSA-2021:4801

Comment 8 errata-xmlrpc 2021-12-02 18:35:12 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2021:4799 https://access.redhat.com/errata/RHSA-2021:4799

Comment 9 errata-xmlrpc 2021-12-02 22:01:15 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2021:4827 https://access.redhat.com/errata/RHSA-2021:4827

Comment 10 Product Security DevOps Team 2021-12-02 23:10:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-21697


Note You need to log in before you can comment on or make changes to this bug.