[JENKINS:SECURITY-2645] Agent-to-controller security bypass in `wildfly-deployer` allows reading arbitrary files

Severity Medium
Affected Packages 2
CVEs 1

wildfly-deployer 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.

This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.

NOTE: This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
See the link:/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3[LTS upgrade guide].

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2645
Severity
medium
Published
2022-09-21T00:00:00
(2 years ago)
Modified
2022-09-21T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository wildfly-deployer repository https://github.com/jenkinsci/wildfly-deployer-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/wildfly-deployer org.jenkins-ci.plugins wildfly-deployer <= 1.0.2
Affected pkg:github/jenkinsci/wildfly-deployer-plugin jenkinsci wildfly-deployer-plugin <= 1.0.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...