Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7308 | Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. |
Github GHSA |
GHSA-9pqq-h9qv-28fp | Jenkins Config Rotator Plugin vulnerable to path traversal |
Wed, 30 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-30T17:37:29.775Z
Reserved: 2022-11-14T00:00:00.000Z
Link: CVE-2022-45388
Updated: 2024-08-03T14:09:56.971Z
Status : Modified
Published: 2022-11-15T20:15:12.150
Modified: 2025-04-30T18:15:36.387
Link: CVE-2022-45388
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA