CVE-2017-1000391 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.73.3 || >=2.74 <2.89
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00186 pctl0.40682
Details
Improper Input Validation in Jenkins Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulting in problems like overwriting of unrelated configuration files.
Metadata
Created: 2022-05-14T01:04:30Z
Modified: 2022-07-01T22:03:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wfj3-535m-p6fx/GHSA-wfj3-535m-p6fx.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-wfj3-535m-p6fx
Finding: F184
Auto approve: 1