SECURITY-2278 / CVE-2021-21670
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier, CloudBees CI 2.289.1.2, CloudBees CI 184.108.40.206.5 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
Jenkins 2.300, LTS 2.289.2, CloudBees CI 2.289.2.2, CloudBees CI 220.127.116.11.6 and CloudBees CI 2.218.104.22.168 requires that users have Item/Read permission for applicable types in addition to Item/Cancel permission.
As a workaround on earlier versions of Jenkins, do not grant Item/Cancel permission to users who do not have Item/Read permission.
SECURITY-2371 / CVE-2021-21671
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier, CloudBees CI 2.289.1.2 and earlier, CloudBees CI 22.214.171.124.5 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
This vulnerability was introduced in Jenkins 2.266 and LTS 2.277.1.
Jenkins 2.300, LTS 2.289.2, CloudBees CI 2.289.2.2, CloudBees 126.96.36.199.6, CloudBees 2.2188.8.131.52 invalidates the existing session on login.
NOTE: In case of problems, administrators can choose a different implementation by setting the Java system property
2, or disable the fix entirely by setting that system property to
The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:
Angélique Jard, CloudBees, Inc. for SECURITY-2278