Description
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6002 | Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system. |
Github GHSA |
GHSA-93mx-2vf9-28c4 | Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T08:16:17.136Z
Reserved: 2022-06-21T00:00:00.000Z
Link: CVE-2022-34179
No data.
Status : Modified
Published: 2022-06-23T17:15:15.810
Modified: 2024-11-21T07:09:00.757
Link: CVE-2022-34179
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA