First published: Wed Jan 12 2022(Updated: )
Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Warnings Next Generation | >=9.0.0<9.0.2 | |
Jenkins Warnings Next Generation | >=9.5.0<9.5.2 | |
Jenkins Warnings Next Generation | >=9.10.0<=9.10.2 | |
Jenkins Warnings Next Generation | =9.7.0 | |
maven/io.jenkins.plugins:warnings-ng | <9.0.2 | 9.0.2 |
maven/io.jenkins.plugins:warnings-ng | >=9.1.0<9.5.2 | 9.5.2 |
maven/io.jenkins.plugins:warnings-ng | >=9.6.0<9.7.1 | 9.7.1 |
maven/io.jenkins.plugins:warnings-ng | >=9.8.0<9.10.3 | 9.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.