GHSA-fwxq-3f52-5cmc

Suggest an improvement
Source
https://github.com/advisories/GHSA-fwxq-3f52-5cmc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-fwxq-3f52-5cmc/GHSA-fwxq-3f52-5cmc.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-fwxq-3f52-5cmc
Aliases
  • CVE-2024-54004
Published
2024-11-27T18:34:04Z
Modified
2024-11-27T20:27:19.711697Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Jenkins Filesystem List Parameter Plugin has Path Traversal vulnerability
Details

Jenkins Filesystem List Parameter Plugin 0.0.14 and earlier does not restrict the path used for the File system objects list Parameter.

This allows attackers with Item/Configure permission to enumerate file names on the Jenkins controller file system.

Filesystem List Parameter Plugin 0.0.15 ensures that paths used by the File system objects list Parameter are restricted to an allow list, with the default base directory set to $JENKINS_HOME/userContent/. The allow list can be configured to include additional custom base directories.

Database specific
{
    "nvd_published_at": "2024-11-27T17:15:15Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-27T20:12:13Z"
}
References

Affected packages

Maven / aendter.jenkins.plugins:filesystem-list-parameter-plugin

Package

Name
aendter.jenkins.plugins:filesystem-list-parameter-plugin
View open source insights on deps.dev
Purl
pkg:maven/aendter.jenkins.plugins/filesystem-list-parameter-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.15

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.0.13
0.0.14