CVE-2018-1000406Path Traversal in Jenkins

CWE-22Path Traversal7 documents6 sources
Severity
6.5MEDIUMNVD
EPSS
9.3%
top 7.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9
Latest updateMay 14

Description

A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

🔴Vulnerability Details

2
OSV
Path Traversal in Jenkins2022-05-14
GHSA
Path Traversal in Jenkins2022-05-14

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2018-10-102018-10-10
Red Hat
jenkins: Arbitrary file write vulnerability using file parameter definitions2018-10-10

💬Community

2
Bugzilla
CVE-2018-1000406 CVE-2018-1000407 CVE-2018-1000408 CVE-2018-1000409 CVE-2018-1000410 CVE-2018-1000997 jenkins: various flaws [fedora-all]2018-10-25
Bugzilla
CVE-2018-1000406 jenkins: Arbitrary file write vulnerability using file parameter definitions2018-10-25
CVE-2018-1000406 — Path Traversal in Jenkins | cvebase