CVE-2024-5273

Jenkins Report Info Plugin 1.2 and earlier does not perform path validation of the workspace directory while serving report files, allowing attackers with Item/Configure permission to retrieve Surefire failures, PMD violations, Findbugs bugs, and Checkstyle errors on the controller file system by editing the workspace path.
Configurations

No configuration.

History

21 Nov 2024, 09:47

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/05/24/2 - () http://www.openwall.com/lists/oss-security/2024/05/24/2 -
References () https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 - () https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 -

07 Nov 2024, 15:35

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/24/2 -
Summary
  • (es) El complemento Jenkins Report Info 1.2 y versiones anteriores no realiza la validación de la ruta del directorio del espacio de trabajo mientras sirve archivos de informes, lo que permite a los atacantes con permiso Item/Configure recuperar fallas de Surefire, violaciones de PMD, errores de Findbugs y errores de Checkstyle en el sistema de archivos del controlador editando el ruta del espacio de trabajo.

24 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 14:15

Updated : 2024-11-21 09:47


NVD link : CVE-2024-5273

Mitre link : CVE-2024-5273

CVE.ORG link : CVE-2024-5273


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')