First published: Mon Jul 23 2018(Updated: )
A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.122<2.132 | 2.132 |
maven/org.jenkins-ci.main:jenkins-core | <2.121.2 | 2.121.2 |
Jenkins LTS | <=2.121.1 | |
Jenkins LTS | >=2.122<=2.132 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999002 is considered a medium severity vulnerability allowing arbitrary file reads.
To fix CVE-2018-1999002, upgrade Jenkins to version 2.132 or later, or to version 2.121.2.
Versions 2.132 and earlier, and 2.121.1 and earlier of Jenkins are affected by CVE-2018-1999002.
CVE-2018-1999002 is an arbitrary file read vulnerability in the Stapler web framework of Jenkins.
Yes, CVE-2018-1999002 can be exploited remotely through crafted HTTP requests.