{"id":"CVE-2021-21677","details":"Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.","aliases":["GHSA-58pr-hprx-7hg6"],"modified":"2026-04-10T04:29:47.528323Z","published":"2021-08-31T14:15:25.447Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/08/31/1"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2376"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/code-coverage-api-plugin","events":[{"introduced":"0"},{"last_affected":"e64303fe11b984e8f661c2ca7fe503173efdb981"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.4.0"}]}}],"versions":["code-coverage-api-1.0.0","code-coverage-api-1.0.0-rc-1","code-coverage-api-1.0.1","code-coverage-api-1.0.10","code-coverage-api-1.0.11","code-coverage-api-1.0.12","code-coverage-api-1.0.13","code-coverage-api-1.0.2","code-coverage-api-1.0.4","code-coverage-api-1.0.6","code-coverage-api-1.0.7","code-coverage-api-1.0.8","code-coverage-api-1.0.9","code-coverage-api-1.1.0","code-coverage-api-1.1.1","code-coverage-api-1.2.1","code-coverage-api-1.3.1","code-coverage-api-1.3.2","code-coverage-api-1.4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21677.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}