logo

CVE-2018-1000607 org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin

Package

Manager: maven
Name: org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin
Vulnerable Version: >=0 <1.5.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00058 pctl0.1839

Details

Arbitrary file write vulnerability in Jenkins Fortify CloudScan Plugin A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.

Metadata

Created: 2022-05-14T03:05:26Z
Modified: 2024-01-30T22:10:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8864-pwhg-3mp2/GHSA-8864-pwhg-3mp2.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-8864-pwhg-3mp2
Finding: F184
Auto approve: 1