Loading HuntDB...

GHSA-mc92-c859-jr66

GitHub Security Advisory

Path traversal vulnerability on Windows in Jenkins Continuous Integration with Toad Edge Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.

Affected Packages

Maven org.jenkins-ci.plugins:ci-with-toad-edge
Affected versions: 0 (fixed in 2.4)

Related CVEs

Key Information

GHSA ID
GHSA-mc92-c859-jr66
Published
March 30, 2022 12:00 AM
Last Modified
November 30, 2022 8:57 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:ci-with-toad-edge
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 27, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.