Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path.
References: https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2021:4833 https://access.redhat.com/errata/RHSA-2021:4833
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2021:4829 https://access.redhat.com/errata/RHSA-2021:4829
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2021:4801 https://access.redhat.com/errata/RHSA-2021:4801
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:4799 https://access.redhat.com/errata/RHSA-2021:4799
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2021:4827 https://access.redhat.com/errata/RHSA-2021:4827
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-21690