{"vulnerability": "CVE-2021-21690", "sightings": [{"uuid": "ec8abfd2-4c00-429f-9b01-f653c724a0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21690", "type": "seen", "source": "https://t.me/cibsecurity/31831", "content": "\u203c CVE-2021-21690 \u203c\n\nAgent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T19:25:09.000000Z"}]}