{"vulnerability": "CVE-2021-2169", "sightings": [{"uuid": "574116d3-b911-4a36-93e6-177cfbbab899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21693", "type": "seen", "source": "https://t.me/cibsecurity/31840", "content": "\u203c CVE-2021-21693 \u203c\n\nWhen creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T19:25:27.000000Z"}, {"uuid": "4660d87f-40f5-4164-a9c6-b40a9a410df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21694", "type": "seen", "source": "https://t.me/cibsecurity/31842", "content": "\u203c CVE-2021-21694 \u203c\n\nFilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T19:25:30.000000Z"}, {"uuid": "29fbe417-c32c-45a6-9873-f2681c108754", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21696", "type": "seen", "source": "https://t.me/cibsecurity/31841", "content": "\u203c CVE-2021-21696 \u203c\n\nJenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T19:25:29.000000Z"}, {"uuid": "067cb354-fb0f-41c3-b2d1-d19d659747a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21699", "type": "seen", "source": "https://t.me/cibsecurity/32297", "content": "\u203c CVE-2021-21699 \u203c\n\nJenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-12T14:38:51.000000Z"}, {"uuid": "36e00663-b68d-4a28-9cfa-cb411f1a6c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21698", "type": "seen", "source": "https://t.me/cibsecurity/31834", "content": "\u203c CVE-2021-21698 \u203c\n\nJenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T19:25:15.000000Z"}, {"uuid": "ec8abfd2-4c00-429f-9b01-f653c724a0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21690", "type": "seen", "source": "https://t.me/cibsecurity/31831", "content": "\u203c CVE-2021-21690 \u203c\n\nAgent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T19:25:09.000000Z"}]}