CVE-2021-21624

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21624
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21624.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-21624
Aliases
Published
2021-03-18T14:15:13Z
Modified
2024-10-12T06:28:38.286347Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.

References

Affected packages

Git / github.com/jenkinsci/role-strategy-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/role-strategy-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

role-strategy-1.*

role-strategy-1.1.3

role-strategy-2.*

role-strategy-2.1.0
role-strategy-2.10
role-strategy-2.11
role-strategy-2.12
role-strategy-2.13
role-strategy-2.14
role-strategy-2.15
role-strategy-2.16
role-strategy-2.2.0
role-strategy-2.3.0
role-strategy-2.3.1
role-strategy-2.3.2
role-strategy-2.4.0
role-strategy-2.5.0
role-strategy-2.5.1
role-strategy-2.6.0
role-strategy-2.6.1
role-strategy-2.7.0
role-strategy-2.8.0
role-strategy-2.8.1
role-strategy-2.8.2
role-strategy-2.9.0

role-strategy-3.*

role-strategy-3.0
role-strategy-3.1