vulnerability
Jenkins Advisory 2017-11-08: Unsafe use of user names as directory names
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:S/C:P/I:C/A:N) | Nov 13, 2017 | Nov 13, 2017 | Feb 19, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:S/C:P/I:C/A:N)
Published
Nov 13, 2017
Added
Nov 13, 2017
Modified
Feb 19, 2025
Description
Jenkins stores metadata related to , which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk.
These directories used the user ID for their name without additional escaping.
This potentially resulted in a number of problems, such as the following:This is not limited to the security realm, other security realms such as LDAP may allow users to create user names that result in problems in Jenkins.User names are now transformed into a filesystem-safe representation that is used as directory name.
Solution
jenkins-lts-upgrade-2_73_3
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.