Jenkins HTML Publisher Plugin 1.32 and earlier archives invalid symbolic links in report directories on agents and recreates them on the controller, allowing attackers with Item/Configure permission to determine whether a path on the Jenkins controller file system exists, without being able to access it.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/03/06/3 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3303 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/03/06/3 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3303 | Vendor Advisory |
Configurations
History
06 May 2025, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2024/03/06/3 - Mailing List | |
| References | () https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3303 - Vendor Advisory | |
| First Time |
Jenkins html Publisher
Jenkins |
|
| CPE | cpe:2.3:a:jenkins:html_publisher:*:*:*:*:*:jenkins:*:* |
Information
Published : 2024-03-06 17:15
Updated : 2025-05-06 20:45
NVD link : CVE-2024-28151
Mitre link : CVE-2024-28151
CVE.ORG link : CVE-2024-28151
JSON object : View
Products Affected
jenkins
- html_publisher
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
