Loading HuntDB...

GHSA-jrqh-c9v8-ccx9

GitHub Security Advisory

Path traversal in Jenkins build-publisher Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any `config.xml` file on the Jenkins controller file system by providing a crafted file name to an API endpoint. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability that allows attackers to replace any `config.xml` file on the Jenkins controller file system with an empty file.

There is currently no known workaround or fix, and this plugin has been suspended.

Affected Packages

Maven org.jenkins-ci.plugins:build-publisher
Affected versions: 0 (last affected: 1.22)

Related CVEs

Key Information

GHSA ID
GHSA-jrqh-c9v8-ccx9
Published
September 22, 2022 12:00 AM
Last Modified
December 6, 2022 2:28 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:build-publisher
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.