Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01cDU5LXY1d20tNzd2NM3mlA
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.
Permalink: https://github.com/advisories/GHSA-5p59-v5wm-77v4JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01cDU5LXY1d20tNzd2NM3mlA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: about 2 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-5p59-v5wm-77v4, CVE-2018-6356
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-6356
- https://www.oracle.com/security-alerts/cpuapr2022.html
- http://www.openwall.com/lists/oss-security/2018/02/14/1
- https://github.com/jenkinsci/jenkins/commit/9de62915807deab61d6e780eed660428f9889b51
- https://github.com/jenkinsci/jenkins/commit/eb03a42078f29dbed3742b8740c95e02890e4545
- https://jenkins.io/security/advisory/2018-02-14
- https://web.archive.org/web/20200227130607/http://www.securityfocus.com/bid/103037
- https://github.com/advisories/GHSA-5p59-v5wm-77v4
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.main:jenkins-core
Affected Version Ranges: >= 2.90, < 2.107, < 2.89.4Fixed in: 2.107, 2.89.4