CVE-2023-24449 – org.jvnet.hudson.plugins:pwauth
Package
Manager: maven
Name: org.jvnet.hudson.plugins:pwauth
Vulnerable Version: >=0 <=0.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00559 pctl0.67245
Details
Path traversal vulnerability in Jenkins PWauth Security Realm Plugin Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Metadata
Created: 2023-01-26T21:30:18Z
Modified: 2023-02-03T20:39:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-5xpc-c4xv-7w62/GHSA-5xpc-c4xv-7w62.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-5xpc-c4xv-7w62
Finding: F063
Auto approve: 1