logo

CVE-2022-23107 io.jenkins.plugins:warnings-ng

Package

Manager: maven
Name: io.jenkins.plugins:warnings-ng
Vulnerable Version: >=9.8.0 <9.10.3 || >=9.6.0 <9.7.1 || >=9.1.0 <9.5.2 || >=0 <9.0.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00662 pctl0.70269

Details

Path Traversal in Jenkins Warnings Next Generation Plugin Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID. This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system. Jenkins Warnings Next Generation Plugin 9.10.3, 9.7.1, 9.5.2, and 9.0.2 checks for the presence of prohibited directory separator characters in the custom ID.

Metadata

Created: 2022-01-21T23:38:05Z
Modified: 2023-10-27T16:10:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-rvh4-g2rj-hr9c/GHSA-rvh4-g2rj-hr9c.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-rvh4-g2rj-hr9c
Finding: F063
Auto approve: 1