Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1807

Опубликовано: 27 фев. 2015
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts.

It was found that when building artifacts, the Jenkins server would follow symbolic links, potentially resulting in disclosure of information on the server.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1205622jenkins: directory traversal from artifacts via symlink (SECURITY-162)

EPSS

Процентиль: 33%
0.00128
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts.

nvd
больше 10 лет назад

Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts.

debian
больше 10 лет назад

Directory traversal vulnerability in Jenkins before 1.600 and LTS befo ...

github
больше 3 лет назад

Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts.

EPSS

Процентиль: 33%
0.00128
Низкий

4 Medium

CVSS2