First published: Fri Feb 16 2018(Updated: )
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <=2.106 | |
Jenkins LTS | <=2.89.3 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000068 has a medium severity level due to the improper input validation allowing unauthorized access to plugin resource files.
To fix CVE-2018-1000068, update Jenkins to version 2.107 or later, or to LTS version 2.89.4 or later.
Jenkins versions 2.106 and earlier, and LTS versions 2.89.3 and earlier are affected by CVE-2018-1000068.
CVE-2018-1000068 primarily affects Jenkins installations where the home directory is on a case-insensitive file system.
The potential impacts of CVE-2018-1000068 include unauthorized access to sensitive plugin resource files, leading to information disclosure.