ghsa-93mx-2vf9-28c4
Vulnerability from github
Published
2022-06-24 00:00
Modified
2022-12-05 22:37
Severity ?
Summary
Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin
Details
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a style
query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Embeddable Build Status Plugin 2.0.4 restricts the style
query parameter to one of the three legal values.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:embeddable-build-status" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.0.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-34179" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2022-07-05T22:59:51Z", "nvd_published_at": "2022-06-23T17:15:00Z", "severity": "MODERATE" }, "details": "Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.\n\nEmbeddable Build Status Plugin 2.0.4 restricts the `style` query parameter to one of the three legal values.", "id": "GHSA-93mx-2vf9-28c4", "modified": "2022-12-05T22:37:25Z", "published": "2022-06-24T00:00:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34179" }, { "type": "WEB", "url": "https://github.com/jenkinsci/embeddable-build-status-plugin/commit/63f82f28d989d30a23089a0a66c11f222651a8c6" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/embeddable-build-status-plugin" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2792" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.