logo

CVE-2023-24449 org.jvnet.hudson.plugins:pwauth

Package

Manager: maven
Name: org.jvnet.hudson.plugins:pwauth
Vulnerable Version: >=0 <=0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00559 pctl0.67245

Details

Path traversal vulnerability in Jenkins PWauth Security Realm Plugin Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

Metadata

Created: 2023-01-26T21:30:18Z
Modified: 2023-02-03T20:39:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-5xpc-c4xv-7w62/GHSA-5xpc-c4xv-7w62.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-5xpc-c4xv-7w62
Finding: F063
Auto approve: 1