Path traversal vulnerability in Jenkins - CVE-2018-1000194 (MAC OS X)ID: oval:org.secpod.oval:def:55975 | Date: (C)2019-07-05 (M)2023-12-02 |
Class: VULNERABILITY | Family: macos |
The host is installed with Jenkins LTS through 2.107.2 or Jenkins rolling release through 2.120 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle an issue in FilePath.java and SoloFilePathFilter.java. Successful exploitation could allow attackers to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.14 |
Product: |
Jenkins LTS |
Jenkins rolling release |