{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11486?format=json","vulnerability_id":"VCID-53km-desw-w7d6","summary":"Protection Mechanism Failure\nJenkins does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.","aliases":[{"alias":"CVE-2021-21696"},{"alias":"GHSA-c5r9-rx53-q3gf"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371167?format=json","purl":"pkg:alpm/archlinux/jenkins@2.319-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jenkins@2.319-1"},{"url":"http://public2.vulnerablecode.io/api/packages/41249?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.3"},{"url":"http://public2.vulnerablecode.io/api/packages/41250?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.319","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.319"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371166?format=json","purl":"pkg:alpm/archlinux/jenkins@2.318-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jenkins@2.318-1"},{"url":"http://public2.vulnerablecode.io/api/packages/41247?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.2"},{"url":"http://public2.vulnerablecode.io/api/packages/143888?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.304","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-4m6t-zty2-b3d6"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-tdb7-6gx7-1ucr"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.304"},{"url":"http://public2.vulnerablecode.io/api/packages/41248?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.318","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.318"},{"url":"http://public2.vulnerablecode.io/api/packages/99829?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637595827-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637595827-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99827?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637596565-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637596565-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99826?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637597018-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637597018-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99828?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637597493-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637597493-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99830?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637698110-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637698110-1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21696.json","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21696","reference_id":"","reference_type":"","scores":[{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76516","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76403","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76416","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76457","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76447","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76481","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76487","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76389","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76371","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21696"},{"reference_url":"https://github.com/jenkinsci/jenkins","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jenkinsci/jenkins"},{"reference_url":"https://github.com/jenkinsci/jenkins/commit/93451e20c20cfd84badeb0f37c38d4c0c7a5dad3","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jenkinsci/jenkins/commit/93451e20c20cfd84badeb0f37c38d4c0c7a5dad3"},{"reference_url":"https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2423","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2423"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/11/04/3","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2021/11/04/3"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020344","reference_id":"2020344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020344"},{"reference_url":"https://security.archlinux.org/ASA-202111-1","reference_id":"ASA-202111-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202111-1"},{"reference_url":"https://security.archlinux.org/AVG-2526","reference_id":"AVG-2526","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2526"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21696","reference_id":"CVE-2021-21696","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21696"},{"reference_url":"https://github.com/advisories/GHSA-c5r9-rx53-q3gf","reference_id":"GHSA-c5r9-rx53-q3gf","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-c5r9-rx53-q3gf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4799","reference_id":"RHSA-2021:4799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4801","reference_id":"RHSA-2021:4801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4827","reference_id":"RHSA-2021:4827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4829","reference_id":"RHSA-2021:4829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4833","reference_id":"RHSA-2021:4833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4833"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":693,"name":"Protection Mechanism Failure","description":"The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product."},{"cwe_id":22,"name":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","description":"The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory."}],"exploits":[],"severity_range_score":"7.0 - 10.0","exploitability":"0.5","weighted_severity":"9.0","risk_score":4.5,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-53km-desw-w7d6"}