{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11490?format=json","vulnerability_id":"VCID-1kf2-8j67-7kg3","summary":"Improper Link Resolution Before File Access ('Link Following')\nFile path filters in the agent-to-controller security subsystem of Jenkins do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.","aliases":[{"alias":"CVE-2021-21686"},{"alias":"GHSA-4g38-hrm4-rg94"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371167?format=json","purl":"pkg:alpm/archlinux/jenkins@2.319-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jenkins@2.319-1"},{"url":"http://public2.vulnerablecode.io/api/packages/41249?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.3"},{"url":"http://public2.vulnerablecode.io/api/packages/41250?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.319","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.319"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371166?format=json","purl":"pkg:alpm/archlinux/jenkins@2.318-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jenkins@2.318-1"},{"url":"http://public2.vulnerablecode.io/api/packages/41249?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.3"},{"url":"http://public2.vulnerablecode.io/api/packages/143888?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.304","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-4m6t-zty2-b3d6"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-tdb7-6gx7-1ucr"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.304"},{"url":"http://public2.vulnerablecode.io/api/packages/41248?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@2.318","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.318"},{"url":"http://public2.vulnerablecode.io/api/packages/99829?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637595827-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637595827-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99827?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637596565-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637596565-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99826?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637597018-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637597018-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99828?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637597493-1?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637597493-1%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/99830?format=json","purl":"pkg:rpm/redhat/jenkins@2.303.3.1637698110-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kf2-8j67-7kg3"},{"vulnerability":"VCID-53km-desw-w7d6"},{"vulnerability":"VCID-7w87-bm8n-bbbr"},{"vulnerability":"VCID-b4zg-38x9-23dn"},{"vulnerability":"VCID-fvza-3rhj-8kbp"},{"vulnerability":"VCID-h3nf-gwsr-5qf3"},{"vulnerability":"VCID-kf3a-yce1-auh4"},{"vulnerability":"VCID-nq1x-s9hz-a7fb"},{"vulnerability":"VCID-r3ry-745m-zuh1"},{"vulnerability":"VCID-r3v1-qkky-dqcq"},{"vulnerability":"VCID-remx-jas5-1bfm"},{"vulnerability":"VCID-wuvf-kdtu-tkc2"},{"vulnerability":"VCID-zgtd-8mf6-ruc9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.303.3.1637698110-1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21686.json","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21686.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21686","reference_id":"","reference_type":"","scores":[{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66416","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66259","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66278","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66285","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66364","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66337","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66357","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66191","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21686"},{"reference_url":"https://github.com/jenkinsci/jenkins","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jenkinsci/jenkins"},{"reference_url":"https://github.com/jenkinsci/jenkins/commit/104c751d907919dd53f5090f84d53c671a66457b","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jenkinsci/jenkins/commit/104c751d907919dd53f5090f84d53c671a66457b"},{"reference_url":"https://github.com/jenkinsci/jenkins/commit/5a245e42979abe4a26d41727c839521e36cedd74","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jenkinsci/jenkins/commit/5a245e42979abe4a26d41727c839521e36cedd74"},{"reference_url":"https://github.com/jenkinsci/jenkins/commit/63cde2daadc705edf086f2213b48c8c547f98358","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jenkinsci/jenkins/commit/63cde2daadc705edf086f2213b48c8c547f98358"},{"reference_url":"https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455","reference_id":"","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020323","reference_id":"2020323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020323"},{"reference_url":"https://security.archlinux.org/ASA-202111-1","reference_id":"ASA-202111-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202111-1"},{"reference_url":"https://security.archlinux.org/AVG-2526","reference_id":"AVG-2526","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2526"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21686","reference_id":"CVE-2021-21686","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21686"},{"reference_url":"https://github.com/advisories/GHSA-4g38-hrm4-rg94","reference_id":"GHSA-4g38-hrm4-rg94","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-4g38-hrm4-rg94"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4799","reference_id":"RHSA-2021:4799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4801","reference_id":"RHSA-2021:4801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4827","reference_id":"RHSA-2021:4827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4829","reference_id":"RHSA-2021:4829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4833","reference_id":"RHSA-2021:4833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4833"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":59,"name":"Improper Link Resolution Before File Access ('Link Following')","description":"The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":22,"name":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","description":"The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory."}],"exploits":[],"severity_range_score":"9.0 - 10.0","exploitability":"0.5","weighted_severity":"9.0","risk_score":4.5,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kf2-8j67-7kg3"}