vulnerability

FreeBSD: VID-06AB7724-0FD7-427E-A5CE-FE436302B10C: jenkins -- multiple vulnerabilities

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
May 9, 2018
Added
May 11, 2018
Modified
Feb 19, 2025

Description



Jenkins developers report:



The agent to master security subsystem ensures that the Jenkins


master is protected from maliciously configured agents. A path


traversal vulnerability allowed agents to escape whitelisted


directories to read and write to files they should not be able to


access.


Black Duck Hub Plugin's API endpoint was affected by an XML


External Entity (XXE) processing vulnerability. This allowed an


attacker with Overall/Read access to have Jenkins parse a maliciously


crafted file that uses external entities for extraction of secrets


from the Jenkins master, server-side request forgery, or


denial-of-service attacks.


Several other lower severity issues were reported, see reference


url for details.




Solution(s)

freebsd-upgrade-package-jenkinsfreebsd-upgrade-package-jenkins-lts

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.