CVE-2018-1000997

CVSS v3.0 6.5 (Medium)
65% Progress
CVSS v2.0 4 (Medium)
40% Progress
EPSS 0.09 % (40th)
0.09% Progress
Affected Products 1
Advisories 2

A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.

Weaknesses
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2019-01-23 22:29:00
(5 years ago)
Updated Date
2019-05-08 22:23:46
(5 years ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Jenkins 2.138.1 and prior versions cpe:2.3:a:jenkins:jenkins::*:*:*:lts <= 2.138.1
  Jenkins 2.145 and prior versions cpe:2.3:a:jenkins:jenkins::*:*:*:- <= 2.145
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...