Description
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
Remediation
References
http://www.openwall.com/lists/oss-security/2021/04/07/2
https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-1721
Related Vulnerabilities
CVE-2020-19698 Vulnerability in maven package org.webjars.npm:editor.md
CVE-2021-26291 Vulnerability in maven package org.apache.maven:apache-maven
CVE-2020-27219 Vulnerability in maven package org.eclipse.hawkbit:hawkbit-update-server
CVE-2022-24377 Vulnerability in npm package cycle-import-check
CVE-2022-45381 Vulnerability in maven package org.jenkins-ci.plugins:pipeline-utility-steps