A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-06-25/#SECURITY-870 | Vendor Advisory |
https://jenkins.io/security/advisory/2018-06-25/#SECURITY-870 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-06-25/#SECURITY-870 - Vendor Advisory |
Information
Published : 2018-06-26 17:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000607
Mitre link : CVE-2018-1000607
CVE.ORG link : CVE-2018-1000607
JSON object : View
Products Affected
jenkins
- fortify_cloudscan
CWE
CWE-20
Improper Input Validation