GHSA-9pqq-h9qv-28fp

Suggest an improvement
Source
https://github.com/advisories/GHSA-9pqq-h9qv-28fp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-9pqq-h9qv-28fp/GHSA-9pqq-h9qv-28fp.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9pqq-h9qv-28fp
Aliases
  • CVE-2022-45388
Published
2022-11-16T12:00:23Z
Modified
2023-11-01T05:00:22.680314Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Jenkins Config Rotator Plugin vulnerable to path traversal
Details

Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. Currently there is no known workaround and no fix available.

Database specific
{
    "nvd_published_at": "2022-11-15T20:15:00Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-11-21T22:23:04Z"
}
References

Affected packages

Maven / org.jenkins-ci.main:config-rotator

Package

Name
org.jenkins-ci.main:config-rotator
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.main/config-rotator

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.0.1