CVE-2021-21679

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21679
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21679.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-21679
Aliases
Published
2021-08-31T14:15:25Z
Modified
2024-10-12T06:47:48.259390Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins Azure AD Plugin 179.vf6841393099e and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.

References

Affected packages

Git / github.com/jenkinsci/azure-ad-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/azure-ad-plugin
Events

Affected versions

164.*

164.v5b48baa961d2

165.*

165.v36344b7d7ca7

167.*

167.v34c2c5a3a030

168.*

168.ve6e7e368dbf6

170.*

170.v0a6219442a99

171.*

171.v9ef20c94d336

172.*

172.vf6a517c3329a

173.*

173.v0a210fffb510

174.*

174.vc2d906355813

175.*

175.v5513346d764a

177.*

177.v80b6c1591bf9

178.*

178.v7b93892fbe4c

179.*

179.vf6841393099e