In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-09-03/#SECURITY-3590 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Sep 2025, 17:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:git_client:*:*:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:git_client:6.2.0:*:*:*:*:jenkins:*:* |
|
References | () https://www.jenkins.io/security/advisory/2025-09-03/#SECURITY-3590 - Vendor Advisory | |
First Time |
Jenkins
Jenkins git Client |
04 Sep 2025, 15:35
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. |
03 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-200 CWE-538 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
03 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-03 15:15
Updated : 2025-09-08 17:14
NVD link : CVE-2025-58458
Mitre link : CVE-2025-58458
CVE.ORG link : CVE-2025-58458
JSON object : View
Products Affected
jenkins
- git_client