Lucene search

K
githubGitHub Advisory DatabaseGHSA-5XPC-C4XV-7W62
HistoryJan 26, 2023 - 9:30 p.m.

Path traversal vulnerability in Jenkins PWauth Security Realm Plugin

2023-01-2621:30:18
CWE-22
GitHub Advisory Database
github.com
5
jenkins
pwauth
security realm plugin
path traversal
vulnerability
file system
attackers

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

27.3%

Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

Affected configurations

Vulners
Node
org.jvnet.hudson.plugins\Matchpwauth
CPENameOperatorVersion
org.jvnet.hudson.plugins:pwauthle0.4

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

27.3%

Related for GHSA-5XPC-C4XV-7W62