A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-05 21:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000194
Mitre link : CVE-2018-1000194
CVE.ORG link : CVE-2018-1000194
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_automated_test_suite
jenkins
- jenkins
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')