Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01aGZwLTk2NHctNXZnbc4AATfj

Improper Limitation of a Pathname to a Restricted Directory in Jenkins

A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.

Permalink: https://github.com/advisories/GHSA-5hfp-964w-5vgm
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01aGZwLTk2NHctNXZnbc4AATfj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 3 months ago


CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-5hfp-964w-5vgm, CVE-2018-1000997
References: Repository: https://github.com/jenkinsci/jenkins

Affected Packages

maven:org.kohsuke.stapler:stapler-parent
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: < 1.250.2
Fixed in: 1.250.2
All affected versions:
All unaffected versions:
maven:org.jenkins-ci.main:jenkins-core
Affected Version Ranges: >= 2.140, <= 2.145, <= 2.138.1
Fixed in: 2.146, 2.138.2