Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-58xm-mxjf-254g] Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins #3974

Conversation

sunSUNQ
Copy link

@sunSUNQ sunSUNQ commented Mar 12, 2024

Updates

  • Affected products
  • References

Comments
Add patch link related to CVE-2021-21685.

@github-actions github-actions bot changed the base branch from main to sunSUNQ/advisory-improvement-3974 March 12, 2024 08:26
@shelbyc
Copy link
Contributor

shelbyc commented Mar 12, 2024

Hi @sunSUNQ, SECURITY-2455 covers 11 separate CVEs. How do you know that jenkinsci/jenkins@104c751 fixes CVE-2021-21685 specifically?

@sunSUNQ
Copy link
Author

sunSUNQ commented Mar 13, 2024

Hello, I found three patches related to SECURITY-2455. The current vulnerability information only provides two of them, without specifying which part of the code specifically fixes the current vulnerability. I believe it is necessary to provide all three patches for a complete understanding.

@advisory-database advisory-database bot merged commit 4f78a9a into sunSUNQ/advisory-improvement-3974 Mar 15, 2024
2 checks passed
@advisory-database advisory-database bot deleted the sunSUNQ-GHSA-58xm-mxjf-254g branch March 15, 2024 16:10
@advisory-database
Copy link
Contributor

Hi @sunSUNQ! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants