Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ydmg0LWcycmotaHI5Y80ikw
Path Traversal in Jenkins Warnings Next Generation Plugin
Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID.
This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
Jenkins Warnings Next Generation Plugin 9.10.3, 9.7.1, 9.5.2, and 9.0.2 checks for the presence of prohibited directory separator characters in the custom ID.
Permalink: https://github.com/advisories/GHSA-rvh4-g2rj-hr9cJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ydmg0LWcycmotaHI5Y80ikw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: 6 months ago
CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Identifiers: GHSA-rvh4-g2rj-hr9c, CVE-2022-23107
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-23107
- https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2090
- http://www.openwall.com/lists/oss-security/2022/01/12/6
- https://github.com/jenkinsci/warnings-ng-plugin/releases/tag/v9.10.3
- https://github.com/CVEProject/cvelist/blob/36f932156733baab1b13868be4338de406a1dec7/2022/23xxx/CVE-2022-23107.json
- https://github.com/advisories/GHSA-rvh4-g2rj-hr9c
Blast Radius: 1.0
Affected Packages
maven:io.jenkins.plugins:warnings-ng
Affected Version Ranges: < 9.0.2, >= 9.1.0, < 9.5.2, >= 9.6.0, < 9.7.1, >= 9.8.0, < 9.10.3Fixed in: 9.0.2, 9.5.2, 9.7.1, 9.10.3