CVE-2018-1000068 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.89.4 || >=2.90 <2.107
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00182 pctl0.40215
Details
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
Metadata
Created: 2022-05-13T01:01:02Z
Modified: 2022-06-30T19:40:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-x6jw-2f23-mc5j/GHSA-x6jw-2f23-mc5j.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-x6jw-2f23-mc5j
Finding: F017
Auto approve: 1