First published: Wed Jan 09 2019(Updated: )
A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.138.1 | |
Jenkins Jenkins | <=2.145 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.140<=2.145 | 2.146 |
maven/org.jenkins-ci.main:jenkins-core | <=2.138.1 | 2.138.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.