
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-21698 is a path traversal vulnerability discovered in Jenkins Subversion Plugin versions 2.15.0 and earlier. The vulnerability was disclosed on November 4, 2021, affecting the Jenkins Subversion Plugin's file lookup mechanism. This security flaw stems from the plugin's failure to properly restrict file names when looking up subversion key files on the controller from an agent (Jenkins Advisory).
The vulnerability is classified with a Medium severity CVSS rating. The core issue lies in the Subversion Plugin's implementation where it does not properly restrict the name of files when performing lookups of subversion key files on the Jenkins controller from an agent. This lack of proper input validation in the file name handling mechanism creates a path traversal vulnerability (Jenkins Advisory).
The vulnerability allows attackers who have control over agent processes to read arbitrary files on the Jenkins controller file system. This unauthorized access to files could potentially lead to exposure of sensitive information stored on the Jenkins controller (Jenkins Advisory).
The vulnerability has been fixed in Subversion Plugin version 2.15.1. The fix implements proper validation by checking for the presence of directory separator characters in file names and prohibiting them, effectively restricting file access to the intended directory. Users are advised to upgrade to Subversion Plugin version 2.15.1 or later to address this security issue (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."