CVE Vulnerabilities

CVE-2021-21639

Published: Apr 07, 2021 | Modified: Nov 21, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
3.1 LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the config.xml REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.

Affected Software

NameVendorStart VersionEnd Version
JenkinsJenkins*2.277.1 (including)
JenkinsJenkins*2.286 (including)
Red Hat OpenShift Container Platform 4.7RedHatjenkins-0:2.277.3.1620393611-1.el8*
Red Hat OpenShift Container Platform 4.8RedHatjenkins-0:2.289.1.1624020353-1.el8*
JenkinsUbuntutrusty*

References