Path Traversal in Jenkins visualexpert Plugin
Moderate severity
GitHub Reviewed
Published
Jan 26, 2023
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Jan 26, 2023
Published to the GitHub Advisory Database
Jan 26, 2023
Reviewed
Jan 27, 2023
Last updated
Feb 3, 2023
Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
References