A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
References
| Link | Resource |
|---|---|
| https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867 | Vendor Advisory |
| https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-01-23 22:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000997
Mitre link : CVE-2018-1000997
CVE.ORG link : CVE-2018-1000997
JSON object : View
Products Affected
jenkins
- jenkins
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
