Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yM2g1LThwaDYtN3JmY80sPQ

Path traversal vulnerability in Jenkins Fortify Plugin

Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, which are used to write to files inside build directories.

This allows attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.

Jenkins Fortify Plugin 20.2.35 sanitizes the appName and appVersion parameters of its Pipeline steps when determining the resulting filename.

Permalink: https://github.com/advisories/GHSA-23h5-8ph6-7rfc
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yM2g1LThwaDYtN3JmY80sPQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 6 months ago


CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Identifiers: GHSA-23h5-8ph6-7rfc, CVE-2022-25188
References: Repository: https://github.com/jenkinsci/fortify-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:fortify
Affected Version Ranges: < 20.2.35
Fixed in: 20.2.35