First published: Fri Feb 28 2014(Updated: )
Directory traversal vulnerability in the CLI job creation (hudson/cli/CreateJobCommand.java) in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to overwrite arbitrary files via the job name.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=1.532.1 | |
Jenkins Jenkins | <=1.550 | |
maven/org.jenkins-ci.main:jenkins-core | <1.532.2 | 1.532.2 |
maven/org.jenkins-ci.main:jenkins-core | >=1.533<1.551 | 1.551 |
<=1.532.1 | ||
<=1.550 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2059 has a high severity rating due to its potential to allow authenticated remote users to overwrite arbitrary files.
To address CVE-2014-2059, upgrade Jenkins to version 1.551 or later, or to LTS version 1.532.2 or later.
CVE-2014-2059 affects Jenkins versions prior to 1.551 and LTS versions prior to 1.532.2.
CVE-2014-2059 can be exploited by remote authenticated users who have access to the Jenkins CLI.
CVE-2014-2059 allows an attacker to overwrite arbitrary files on the server via crafted job names.