Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01aGZwLTk2NHctNXZnbc4AATfj
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
Permalink: https://github.com/advisories/GHSA-5hfp-964w-5vgmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01aGZwLTk2NHctNXZnbc4AATfj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 3 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-5hfp-964w-5vgm, CVE-2018-1000997
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000997
- https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867
- https://github.com/jenkinsci/jenkins/commit/fd5f5be0304c6bf1918892b81e2efb6b6d09c521
- https://github.com/jenkinsci/stapler/commit/0dfc28aa2102a59638484fc11c4c53b1dbb2baf0
- https://github.com/advisories/GHSA-5hfp-964w-5vgm
Affected Packages
maven:org.kohsuke.stapler:stapler-parent
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 1.250.2
Fixed in: 1.250.2
All affected versions:
All unaffected versions:
maven:org.jenkins-ci.main:jenkins-core
Affected Version Ranges: >= 2.140, <= 2.145, <= 2.138.1Fixed in: 2.146, 2.138.2