Description
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5728 | An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system. |
Github GHSA |
GHSA-x6jw-2f23-mc5j | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:33:49.059Z
Reserved: 2018-02-15T00:00:00.000Z
Link: CVE-2018-1000068
No data.
Status : Modified
Published: 2018-02-16T00:29:01.887
Modified: 2024-11-21T03:39:33.830
Link: CVE-2018-1000068
OpenCVE Enrichment
No data.
EUVD
Github GHSA