logo

CVE-2023-24455 io.jenkins.plugins:visualexpert

Package

Manager: maven
Name: io.jenkins.plugins:visualexpert
Vulnerable Version: >=0 <=1.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00559 pctl0.67368

Details

Path Traversal in Jenkins visualexpert Plugin Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

Metadata

Created: 2023-01-26T21:30:18Z
Modified: 2023-02-03T20:34:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-8mmh-h4jh-2g34/GHSA-8mmh-h4jh-2g34.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-8mmh-h4jh-2g34
Finding: F063
Auto approve: 1