Описание
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
Ссылки
- Vendor Advisory
- PatchThird Party Advisory
- Vendor Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.120 (включая)
cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
Конфигурация 2Версия до 2.107.2 (включая)
cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
Конфигурация 3
cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00469
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 7.5
redhat
больше 7 лет назад
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
CVSS3: 8.1
debian
больше 7 лет назад
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS ...
EPSS
Процентиль: 64%
0.00469
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-22