CVE-2018-6356 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.89.4 || >=2.90 <2.107
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.36589 pctl0.97016
Details
Improper Limitation of a Pathname to a Restricted Directory in Jenkins Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.
Metadata
Created: 2022-05-13T01:01:01Z
Modified: 2024-03-01T22:19:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5p59-v5wm-77v4/GHSA-5p59-v5wm-77v4.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-5p59-v5wm-77v4
Finding: F063
Auto approve: 1