Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000997

Опубликовано: 10 окт. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkinsWill not fix
Red Hat OpenShift Container Platform 3.4jenkinsWill not fix
Red Hat OpenShift Container Platform 3.5jenkinsWill not fix
Red Hat OpenShift Container Platform 3.6jenkinsWill not fix
Red Hat OpenShift Container Platform 3.7jenkinsWill not fix
Red Hat OpenShift Container Platform 3.9jenkinsWill not fix
Red Hat OpenShift Container Platform 4jenkinsNot affected
Red Hat OpenShift Container Platform 3.11atomic-enterprise-service-catalogFixedRHBA-2018:374312.12.2018
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHBA-2018:374312.12.2018
Red Hat OpenShift Container Platform 3.11atomic-openshift-cluster-autoscalerFixedRHBA-2018:374312.12.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1642876jenkins: Path traversal vulnerability in Stapler allowed accessing internal data

EPSS

Процентиль: 83%
0.01923
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
около 7 лет назад

A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.

CVSS3: 6.5
debian
около 7 лет назад

A path traversal vulnerability exists in the Stapler web framework use ...

CVSS3: 6.5
github
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in Jenkins

EPSS

Процентиль: 83%
0.01923
Низкий

6.5 Medium

CVSS3