ID CVE-2021-21626
Summary Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:-:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:-:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta1:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta1:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta10:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta10:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta2:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta2:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta3:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta3:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta4:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta4:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta5:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta5:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta6:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta6:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta7:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta7:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta8:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta8:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta9:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta9:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:5.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:5.0.0:*:*:*:*:jenkins:*:*
CVSS
Base: 4.0 (as of 24-03-2021 - 16:43)
Impact:
Exploitability:
CWE CWE-862
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:N
Last major update 24-03-2021 - 16:43
Published 18-03-2021 - 14:15
Last modified 24-03-2021 - 16:43
Back to Top