Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10352

Опубликовано: 17 июл. 2019
Источник: redhat
CVSS3: 6.5

Описание

A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkinsWill not fix
Red Hat OpenShift Container Platform 3.6jenkinsWill not fix
Red Hat OpenShift Container Platform 3.7jenkinsWill not fix
Red Hat OpenShift Container Platform 3.9jenkinsWill not fix
Red Hat OpenShift Container Platform 3.11jenkinsFixedRHSA-2019:250315.08.2019
Red Hat OpenShift Container Platform 4.1jenkinsFixedRHSA-2019:254828.08.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1730824jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424)

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 6 лет назад

A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.

CVSS3: 6.5
debian
больше 6 лет назад

A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176 ...

CVSS3: 6.5
github
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in Jenkins

6.5 Medium

CVSS3