Lucene search

K
osvGoogleOSV:GHSA-Q6CQ-8R4J-6RJ5
HistoryJul 12, 2023 - 6:30 p.m.

Jenkins MathWorks Polyspace Plugin vulnerable to arbitrary file read

2023-07-1218:30:39
Google
osv.dev
5
jenkins
mathworks
polyspace
plugin
arbitrary file read
vulnerability
file system
security

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

27.8%

Jenkins MathWorks Polyspace Plugin 1.0.5 and earlier does not restrict the path of the attached files in Polyspace Notification post-build step.

This allows attackers with Item/Configure permission to send emails with arbitrary files from the Jenkins controller file system.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

27.8%

Related for OSV:GHSA-Q6CQ-8R4J-6RJ5