First published: Tue Jun 05 2018(Updated: )
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=2.120 | |
Jenkins | <=2.107.2 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000194 is rated as a high severity vulnerability due to its potential to allow unauthorized file access.
To fix CVE-2018-1000194, upgrade Jenkins to version 2.121 or later, or LTS to version 2.107.3 or later.
CVE-2018-1000194 affects Jenkins versions up to and including 2.120 and LTS versions up to and including 2.107.2.
CVE-2018-1000194 allows attackers to perform path traversal and read or write arbitrary files on the Jenkins master.
Yes, CVE-2018-1000194 specifically affects Oracle Communications Cloud Native Core Automated Test Suite version 1.9.0.