A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-05T21:00:00
Updated: 2022-04-19T23:19:22
Reserved: 2018-05-09T00:00:00
Link: CVE-2018-1000194
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-05T21:29:00.587
Modified: 2022-06-13T19:03:16.577
Link: CVE-2018-1000194
JSON object: View
Redhat Information
No data.
CWE