cvelist/2021/21xxx/CVE-2021-21621.json
2021-02-24 16:00:42 +00:00

71 lines
2.5 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2021-21621",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins Support Core Plugin",
"version": {
"version_data": [
{
"version_value": "2.72",
"version_affected": "<="
},
{
"version_value": "2.70.1",
"version_affected": "!"
},
{
"version_value": "2.68.1",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the \"About user (basic authentication details only)\" information, which can include the session ID of the user creating the support bundle in some configurations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-201: Insertion of Sensitive Information Into Sent Data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2150",
"url": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2150",
"refsource": "CONFIRM"
}
]
}
}