Description
Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0753 | Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker. |
Github GHSA |
GHSA-23h5-8ph6-7rfc | Path traversal vulnerability in Jenkins Fortify Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T04:36:05.956Z
Reserved: 2022-02-15T00:00:00.000Z
Link: CVE-2022-25188
No data.
Status : Modified
Published: 2022-02-15T17:15:09.547
Modified: 2024-11-21T06:51:46.637
Link: CVE-2022-25188
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA