Rapid7 Vulnerability & Exploit Database

Jenkins Advisory 2018-02-14: CVE-2018-6356: Path traversal vulnerability

Back to Search

Jenkins Advisory 2018-02-14: CVE-2018-6356: Path traversal vulnerability

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
02/20/2018
Created
07/25/2018
Added
02/22/2018
Modified
03/20/2018

Description

Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.

Solution(s)

  • jenkins-lts-upgrade-2_89_4
  • jenkins-upgrade-2_107

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;