Loading HuntDB...

GHSA-f585-9fw3-rj2m

GitHub Security Advisory

Arbitrary file existence check in file fingerprints in Jenkins

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins provides a feature for jobs to store and track fingerprints of files used during a build. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier provides a REST API to check where a given fingerprint was used by which builds. This endpoint does not fully validate that the provided fingerprint ID is properly formatted before checking for the XML metadata for that fingerprint on the controller file system.

This allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the relative path can be constructed as 32 characters.

Jenkins 2.275, LTS 2.263.2 validates that a fingerprint ID is properly formatted before checking for its existence.

Affected Packages

Maven org.jenkins-ci.main:jenkins-core
Affected versions: 0 (fixed in 2.263.2)
Maven org.jenkins-ci.main:jenkins-core
Affected versions: 2.264 (fixed in 2.275)

Related CVEs

Key Information

GHSA ID
GHSA-f585-9fw3-rj2m
Published
May 24, 2022 5:39 PM
Last Modified
December 13, 2022 3:20 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.main:jenkins-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.