Description
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5722 | A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection. |
Github GHSA |
GHSA-x646-m7x2-gcp7 | Path Traversal in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:47.051Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-1000194
No data.
Status : Modified
Published: 2018-06-05T21:29:00.587
Modified: 2024-11-21T03:39:54.293
Link: CVE-2018-1000194
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA