[JENKINS:SECURITY-1668] Arbitrary file write vulnerability in `cobertura`

Severity Medium
Affected Packages 2
Fixed Packages 2
CVEs 1

cobertura 1.15 and earlier does not validate file paths from the XML file it parses.

This allows attackers able to control the coverage report content to overwrite any file on the Jenkins controller file system.

cobertura 1.16 sanitizes the file paths to prevent escape from the base directory.

ID
JENKINS:SECURITY-1668
Severity
medium
Published
2020-03-09T00:00:00
(4 years ago)
Modified
2020-03-09T00:00:00
(4 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository cobertura repository https://github.com/jenkinsci/cobertura-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/cobertura org.jenkins-ci.plugins cobertura <= 1.15
Fixed pkg:maven/org.jenkins-ci.plugins/cobertura org.jenkins-ci.plugins cobertura = 1.16
Affected pkg:github/jenkinsci/cobertura-plugin jenkinsci cobertura-plugin <= 1.15
Fixed pkg:github/jenkinsci/cobertura-plugin jenkinsci cobertura-plugin = 1.16
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...