Jenkins Report Info Plugin 1.2 and earlier does not perform path validation of the workspace directory while serving report files, allowing attackers with Item/Configure permission to retrieve Surefire failures, PMD violations, Findbugs bugs, and Checkstyle errors on the controller file system by editing the workspace path.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/05/24/2 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/05/24/2 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-05-24/#SECURITY-3070 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-05-24 14:15
Updated : 2025-10-10 15:34
NVD link : CVE-2024-5273
Mitre link : CVE-2024-5273
CVE.ORG link : CVE-2024-5273
JSON object : View
Products Affected
jenkins
- report_info
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
