[JENKINS:SECURITY-2645] Agent-to-controller security bypass in `wildfly-deployer` allows reading arbitrary files
Severity
Medium
Affected Packages
2
CVEs
1
wildfly-deployer
1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.
This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
NOTE: This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
See the link:/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3[LTS upgrade guide].
As of publication of this advisory, there is no fix.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/wildfly-deployer | <= 1.0.2 |
pkg:github/jenkinsci/wildfly-deployer-plugin | <= 1.0.2 |
- ID
- JENKINS:SECURITY-2645
- Severity
- medium
- Published
-
2022-09-21T00:00:00
(2 years ago) - Modified
-
2022-09-21T00:00:00
(2 years ago) - Rights
- Jenkins Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Plugin repository | wildfly-deployer repository | https://github.com/jenkinsci/wildfly-deployer-plugin |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/wildfly-deployer | org.jenkins-ci.plugins | wildfly-deployer | <= 1.0.2 | |||
Affected | pkg:github/jenkinsci/wildfly-deployer-plugin | jenkinsci | wildfly-deployer-plugin | <= 1.0.2 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |