CVE-2018-1000862

An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

History

21 Nov 2024, 03:40

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106176 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106176 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHBA-2019:0024 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2019:0024 - Third Party Advisory
References () https://jenkins.io/security/advisory/2018-12-05/#SECURITY-904 - Vendor Advisory () https://jenkins.io/security/advisory/2018-12-05/#SECURITY-904 - Vendor Advisory

Information

Published : 2018-12-10 14:29

Updated : 2024-11-21 03:40


NVD link : CVE-2018-1000862

Mitre link : CVE-2018-1000862

CVE.ORG link : CVE-2018-1000862


JSON object : View

Products Affected

jenkins

  • jenkins

redhat

  • openshift_container_platform
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor