Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-1000194


A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.


Published

2018-06-05T21:29:00.587

Last Modified

2024-11-21T03:39:54.293

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application jenkins jenkins ≤ 2.120 Yes
Application jenkins jenkins ≤ 2.107.2 Yes
Application oracle communications_cloud_native_core_automated_test_suite 1.9.0 Yes

References