Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-1382 Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.
Github GHSA Github GHSA GHSA-8p4x-fq8v-xhv4 Arbitrary file read vulnerability in Jenkins Continuous Integration with Toad Edge Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T05:48:36.756Z

Reserved: 2022-03-29T00:00:00

Link: CVE-2022-28146

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-29T13:15:08.673

Modified: 2024-11-21T06:56:50.557

Link: CVE-2022-28146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.