Lucene search

K
osvGoogleOSV:GHSA-23H5-8PH6-7RFC
HistoryFeb 16, 2022 - 12:01 a.m.

Path traversal vulnerability in Jenkins Fortify Plugin

2022-02-1600:01:27
Google
osv.dev
12

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.8%

Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, which are used to write to files inside build directories.

This allows attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.

Jenkins Fortify Plugin 20.2.35 sanitizes the appName and appVersion parameters of its Pipeline steps when determining the resulting filename.

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.8%