A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Information
Published : 2018-06-05 14:29
Updated : 2022-06-13 12:03
NVD link : CVE-2018-1000194
Mitre link : CVE-2018-1000194
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
oracle
- communications_cloud_native_core_automated_test_suite
jenkins
- jenkins