Description
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7308 | Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. |
Github GHSA |
GHSA-9pqq-h9qv-28fp | Jenkins Config Rotator Plugin vulnerable to path traversal |
References
History
Wed, 30 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-30T17:37:29.775Z
Reserved: 2022-11-14T00:00:00.000Z
Link: CVE-2022-45388
Updated: 2024-08-03T14:09:56.971Z
Status : Modified
Published: 2022-11-15T20:15:12.150
Modified: 2025-04-30T18:15:36.387
Link: CVE-2022-45388
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA