Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pxgq-gqr9-5gwx

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8

Описание

Path traversal vulnerability in Jenkins agent names

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override unrelated config.xml files. If the global config.xml file is replaced, Jenkins will start up with unsafe legacy defaults after a restart.

Jenkins 2.275, LTS 2.263.2 ensures that agent names are considered valid names for items to prevent this problem.

In case of problems, this change can be reverted by setting the Java system property jenkins.model.Nodes.enforceNameRestrictions to false.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

< 2.263.2

2.263.2

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.264, < 2.275

2.275

EPSS

Процентиль: 63%
0.00441
Низкий

8 High

CVSS3

Дефекты

CWE-20
CWE-22

Связанные уязвимости

CVSS3: 8
redhat
около 5 лет назад

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.

CVSS3: 8
nvd
около 5 лет назад

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.

CVSS3: 8
debian
около 5 лет назад

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with A ...

EPSS

Процентиль: 63%
0.00441
Низкий

8 High

CVSS3

Дефекты

CWE-20
CWE-22