CVE-2022-45388 – org.jenkins-ci.main:config-rotator
Package
Manager: maven
Name: org.jenkins-ci.main:config-rotator
Vulnerable Version: >=0 <=2.0.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00183 pctl0.40283
Details
Jenkins Config Rotator Plugin vulnerable to path traversal Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. Currently there is no known workaround and no fix available.
Metadata
Created: 2022-11-16T12:00:23Z
Modified: 2022-12-15T21:06:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-9pqq-h9qv-28fp/GHSA-9pqq-h9qv-28fp.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-9pqq-h9qv-28fp
Finding: F063
Auto approve: 1