Path traversal vulnerability on Windows in Jenkins
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 22, 2023
Package
Affected versions
<= 2.303.1
>= 2.304, <= 2.314
Patched versions
2.303.2
2.315
Description
Published by the National Vulnerability Database
Oct 6, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 15, 2022
Last updated
Dec 22, 2023
The file browser for workspaces, archived artifacts, and
userContent/
in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows.This results in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.\n\nThe file browser in Jenkins 2.315, LTS 2.303.2 refuses to serve files that would be considered absolute paths.
References