Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1ydmg0LWcycmotaHI5Y80ikw

Path Traversal in Jenkins Warnings Next Generation Plugin

Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID.

This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.

Jenkins Warnings Next Generation Plugin 9.10.3, 9.7.1, 9.5.2, and 9.0.2 checks for the presence of prohibited directory separator characters in the custom ID.

Permalink: https://github.com/advisories/GHSA-rvh4-g2rj-hr9c
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ydmg0LWcycmotaHI5Y80ikw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: 6 months ago


CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-rvh4-g2rj-hr9c, CVE-2022-23107
References: Repository: https://github.com/jenkinsci/warnings-ng-plugin
Blast Radius: 1.0

Affected Packages

maven:io.jenkins.plugins:warnings-ng
Affected Version Ranges: < 9.0.2, >= 9.1.0, < 9.5.2, >= 9.6.0, < 9.7.1, >= 9.8.0, < 9.10.3
Fixed in: 9.0.2, 9.5.2, 9.7.1, 9.10.3