First published: Tue Jun 26 2018(Updated: )
A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin | <=1.5.1 | 1.5.2 |
Jenkins Fortify | <=1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000607 is considered a high severity vulnerability due to the potential for unauthorized file overwrites on the Jenkins master file system.
To fix CVE-2018-1000607, upgrade the Jenkins Fortify CloudScan Plugin to version 1.5.2 or later.
The affected versions of the Jenkins Fortify CloudScan Plugin are 1.5.1 and earlier.
Exploiting CVE-2018-1000607 can allow attackers to overwrite any file on the Jenkins master file system, using controlled rulepack zip file contents.
Any Jenkins installation using Fortify CloudScan Plugin version 1.5.1 or earlier is potentially affected by CVE-2018-1000607.