An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106176 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHBA-2019:0024 | Third Party Advisory |
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-904 | Vendor Advisory |
http://www.securityfocus.com/bid/106176 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHBA-2019:0024 | Third Party Advisory |
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-904 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106176 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHBA-2019:0024 - Third Party Advisory | |
References | () https://jenkins.io/security/advisory/2018-12-05/#SECURITY-904 - Vendor Advisory |
Information
Published : 2018-12-10 14:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000862
Mitre link : CVE-2018-1000862
CVE.ORG link : CVE-2018-1000862
JSON object : View
Products Affected
jenkins
- jenkins
redhat
- openshift_container_platform
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor