logo

CVE-2017-1000391 org.jenkins-ci.main:jenkins-core

Package

Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.73.3 || >=2.74 <2.89

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00186 pctl0.40682

Details

Improper Input Validation in Jenkins Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulting in problems like overwriting of unrelated configuration files.

Metadata

Created: 2022-05-14T01:04:30Z
Modified: 2022-07-01T22:03:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wfj3-535m-p6fx/GHSA-wfj3-535m-p6fx.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-wfj3-535m-p6fx
Finding: F184
Auto approve: 1