Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00eDYzLTNwN3EteG1oN84AAWxX

Jenkins HTML Publisher Plugin path traversal vulnerability

A path traversal vulnerability exists in Jenkins HTML Publisher Plugin 1.15 and older in HtmlPublisherTarget.java that allows attackers able to configure the HTML Publisher build step to override arbitrary files on the Jenkins master. In version 1.16, non-alphanumeric characters in report names are escaped for use as part of a URL and as a directory name.

Permalink: https://github.com/advisories/GHSA-4x63-3p7q-xmh7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00eDYzLTNwN3EteG1oN84AAWxX
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-4x63-3p7q-xmh7, CVE-2018-1000175
References: Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:htmlpublisher
Affected Version Ranges: <= 1.15
Fixed in: 1.16