First published: Wed Jan 23 2019(Updated: )
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.138.1 | |
Jenkins Jenkins | <=2.145 | |
maven/org.kohsuke.stapler:stapler-parent | <1.250.2 | 1.250.2 |
maven/org.jenkins-ci.main:jenkins-core | >=2.140<=2.145 | 2.146 |
maven/org.jenkins-ci.main:jenkins-core | <=2.138.1 | 2.138.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000997 is rated as a medium severity vulnerability due to potential path traversal issues.
To fix CVE-2018-1000997, upgrade to Jenkins version 2.146 or later, or 2.138.2 or later for LTS versions.
CVE-2018-1000997 affects Jenkins versions 2.145 and earlier, and LTS versions 2.138.1 and earlier.
The vulnerability in CVE-2018-1000997 is a path traversal vulnerability in the Stapler web framework.
Yes, CVE-2018-1000997 can be exploited remotely if the affected Jenkins instance is reachable and misconfigured.