In Jenkins Git client Plugin 6.3.2 and earlier, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Sep 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins git Client Plugin |
|
Vendors & Products |
Jenkins
Jenkins git Client Plugin |
Wed, 03 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 CWE-538 |
|
Metrics |
cvssV3_1
|
Wed, 03 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Jenkins Git client Plugin 6.3.2 and earlier, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | |
References |
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-09-03T15:45:52.154Z
Reserved: 2025-09-02T12:44:16.983Z
Link: CVE-2025-58458

Updated: 2025-09-03T15:40:08.054Z

Status : Received
Published: 2025-09-03T15:15:39.520
Modified: 2025-09-03T16:15:40.737
Link: CVE-2025-58458

No data.

Updated: 2025-09-03T20:26:54Z