First published: Mon Dec 10 2018(Updated: )
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.140<=2.153 | 2.154 |
maven/org.jenkins-ci.main:jenkins-core | <=2.138.3 | 2.138.4 |
Jenkins Jenkins | <=2.138.3 | |
Jenkins Jenkins | <=2.153 | |
Red Hat OpenShift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000862 is considered a medium severity vulnerability due to the potential for information exposure.
To fix CVE-2018-1000862, upgrade Jenkins to version 2.154 or later, or LTS version 2.138.4 or later.
CVE-2018-1000862 affects Jenkins versions 2.153 and earlier, and LTS versions 2.138.3 and earlier.
CVE-2018-1000862 is an information exposure vulnerability that allows unauthorized file system browsing.
Yes, CVE-2018-1000862 can be exploited by attackers who control build outputs on Jenkins agents.