Information Exposure Affecting jenkins package, versions <0:2.277.3.1620393611-1.el8


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-JENKINS-4401377
  • published26 Jul 2021
  • disclosed1 Apr 2021

Introduced: 1 Apr 2021

CVE-2021-28163  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade RHEL:8 jenkins to version 0:2.277.3.1620393611-1.el8 or higher.
This issue was patched in RHSA-2021:1551.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jenkins package and not the jenkins package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory.

References

CVSS Scores

version 3.1