Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00eDYzLTNwN3EteG1oN84AAWxX
Jenkins HTML Publisher Plugin path traversal vulnerability
A path traversal vulnerability exists in Jenkins HTML Publisher Plugin 1.15 and older in HtmlPublisherTarget.java that allows attackers able to configure the HTML Publisher build step to override arbitrary files on the Jenkins master. In version 1.16, non-alphanumeric characters in report names are escaped for use as part of a URL and as a directory name.
Permalink: https://github.com/advisories/GHSA-4x63-3p7q-xmh7JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00eDYzLTNwN3EteG1oN84AAWxX
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 8 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-4x63-3p7q-xmh7, CVE-2018-1000175
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000175
- https://jenkins.io/security/advisory/2018-04-16/
- https://github.com/advisories/GHSA-4x63-3p7q-xmh7
Affected Packages
maven:org.jenkins-ci.plugins:htmlpublisher
Versions: <= 1.15Fixed in: 1.16