vulnerability

Jenkins Advisory 2018-10-10: CVE-2018-1000997: Path traversal vulnerability in Stapler allowed accessing internal data

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
2019-01-24
Added
2019-01-24
Modified
2019-02-15

Description

A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.

Solution(s)

jenkins-lts-upgrade-2_138_2jenkins-upgrade-2_146
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.