Описание
Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.
Ссылки
- Mailing ListThird Party Advisory
- Issue TrackingPatchVendor Advisory
- Mailing ListThird Party Advisory
- Issue TrackingPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 20.2.34 (включая)
cpe:2.3:a:jenkins:fortify:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 53%
0.00306
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 4.3
github
больше 3 лет назад
Path traversal vulnerability in Jenkins Fortify Plugin
EPSS
Процентиль: 53%
0.00306
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-22