First published: Thu Feb 09 2017(Updated: )
Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.tap4j:tap | <1.25 | 1.25 |
Jenkins | <1.25 | |
<1.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4986 has been classified as a high-severity vulnerability due to its potential to allow remote attackers to read arbitrary files.
To fix CVE-2016-4986, update the TAP plugin to version 1.25 or later.
CVE-2016-4986 allows attackers to exploit a directory traversal vulnerability to read arbitrary files on the Jenkins server.
Versions of the TAP plugin before 1.25 are affected by CVE-2016-4986.
There are no documented workarounds for CVE-2016-4986 other than updating the TAP plugin.