Path traversal vulnerability in Jenkins - CVE-2018-1000194ID: oval:org.secpod.oval:def:55614 | Date: (C)2019-06-26 (M)2023-12-02 |
Class: VULNERABILITY | Family: windows |
The host is installed with Jenkins LTS through 2.107.2 or Jenkins rolling release through 2.120 and is prone to an path traversal vulnerability. A flaw is present in the application, which fails to properly handle an issue in FilePath.java and SoloFilePathFilter.java. Successful exploitation could allow attackers to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Jenkins LTS |
Jenkins rolling release |