Loading HuntDB...

CVE-2022-23107

UNKNOWN
Published 2022-01-12T19:06:06
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2022-23107. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Path Traversal in Jenkins Warnings Next Generation Plugin

GHSA-rvh4-g2rj-hr9c

Advisory Details

Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID. This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system. Jenkins Warnings Next Generation Plugin 9.10.3, 9.7.1, 9.5.2, and 9.0.2 checks for the presence of prohibited directory separator characters in the custom ID.

Affected Packages

Maven io.jenkins.plugins:warnings-ng
ECOSYSTEM: ≥9.8.0 <9.10.3
Maven io.jenkins.plugins:warnings-ng
ECOSYSTEM: ≥9.6.0 <9.7.1
Maven io.jenkins.plugins:warnings-ng
ECOSYSTEM: ≥9.1.0 <9.5.2
Maven io.jenkins.plugins:warnings-ng
ECOSYSTEM: ≥0 <9.0.2

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Advisory provided by GitHub Security Advisory Database. Published: January 21, 2022, Modified: October 27, 2023

References

Published: 2022-01-12T19:06:06
Last Modified: 2024-08-03T03:36:19.199Z
Copied to clipboard!