ID CVE-2021-21626
Summary Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:-:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:-:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta1:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta1:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta10:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta10:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta2:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta2:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta3:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta3:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta4:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta4:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta5:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta5:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta6:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta6:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta7:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta7:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta8:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta8:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta9:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.0:beta9:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:1.0.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:1.0.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.2.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:2.2.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:2.2.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:3.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:3.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:3.0.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:3.0.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:3.0.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:3.0.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:3.0.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:3.0.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:4.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:4.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:5.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:5.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:5.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:5.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:5.2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:5.2.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:5.2.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:5.2.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:5.3.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:5.3.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.0.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.0.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.0.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.0.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.0.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.0.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.0.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.0.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:6.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:6.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.2.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.2.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.2.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.2.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.2.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:7.3.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:7.3.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.0.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.0.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.2.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.3.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.3.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.3.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.3.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:warnings_next_generation:8.4.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:warnings_next_generation:8.4.4:*:*:*:*:jenkins:*:*
CVSS
Base: 4.0 (as of 25-10-2023 - 18:16)
Impact:
Exploitability:
CWE CWE-862
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:N
Last major update 25-10-2023 - 18:16
Published 18-03-2021 - 14:15
Last modified 25-10-2023 - 18:16
Back to Top