CVE-2018-1000607 – org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin
Package
Manager: maven
Name: org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin
Vulnerable Version: >=0 <1.5.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00058 pctl0.1839
Details
Arbitrary file write vulnerability in Jenkins Fortify CloudScan Plugin A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.
Metadata
Created: 2022-05-14T03:05:26Z
Modified: 2024-01-30T22:10:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8864-pwhg-3mp2/GHSA-8864-pwhg-3mp2.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-8864-pwhg-3mp2
Finding: F184
Auto approve: 1