Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f585-9fw3-rj2m

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Arbitrary file existence check in file fingerprints in Jenkins

Jenkins provides a feature for jobs to store and track fingerprints of files used during a build. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier provides a REST API to check where a given fingerprint was used by which builds. This endpoint does not fully validate that the provided fingerprint ID is properly formatted before checking for the XML metadata for that fingerprint on the controller file system.

This allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the relative path can be constructed as 32 characters.

Jenkins 2.275, LTS 2.263.2 validates that a fingerprint ID is properly formatted before checking for its existence.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

< 2.263.2

2.263.2

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.264, <= 2.274

2.275

EPSS

Процентиль: 46%
0.00235
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 4.3
redhat
около 5 лет назад

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.

CVSS3: 4.3
nvd
около 5 лет назад

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.

CVSS3: 4.3
debian
около 5 лет назад

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validate ...

EPSS

Процентиль: 46%
0.00235
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-20