Path traversal vulnerability in Jenkins Subversion Plugin allows reading arbitrary files
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 18, 2023
Package
Affected versions
<= 2.15.0
Patched versions
2.15.1
Description
Published by the National Vulnerability Database
Nov 4, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 16, 2022
Last updated
Dec 18, 2023
Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
Subversion Plugin 2.15.1 checks for the presence of and prohibits directory separator characters as part of the file name, restricting it to the intended directory.
References