Jenkins Report Info Plugin 1.2 and earlier does not perform path validation of the workspace directory while serving report files, allowing attackers with Item/Configure permission to retrieve Surefire failures, PMD violations, Findbugs bugs, and Checkstyle errors on the controller file system by editing the workspace path.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/05/24/2 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/05/24/2 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 | Vendor Advisory |
Configurations
History
10 Oct 2025, 15:34
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jenkins
Jenkins report Info |
|
| References | () http://www.openwall.com/lists/oss-security/2024/05/24/2 - Mailing List | |
| References | () https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 - Vendor Advisory | |
| CPE | cpe:2.3:a:jenkins:report_info:*:*:*:*:*:jenkins:*:* |
Information
Published : 2024-05-24 14:15
Updated : 2025-10-10 15:34
NVD link : CVE-2024-5273
Mitre link : CVE-2024-5273
CVE.ORG link : CVE-2024-5273
JSON object : View
Products Affected
jenkins
- report_info
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
