CVE-2023-24455 – io.jenkins.plugins:visualexpert
Package
Manager: maven
Name: io.jenkins.plugins:visualexpert
Vulnerable Version: >=0 <=1.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00559 pctl0.67368
Details
Path Traversal in Jenkins visualexpert Plugin Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Metadata
Created: 2023-01-26T21:30:18Z
Modified: 2023-02-03T20:34:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-8mmh-h4jh-2g34/GHSA-8mmh-h4jh-2g34.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-8mmh-h4jh-2g34
Finding: F063
Auto approve: 1