Arbitrary File Read Affecting io.jenkins.plugins:mathworks-polyspace package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.3% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-IOJENKINSPLUGINS-5773332
  • published13 Jul 2023
  • disclosed13 Jul 2023
  • creditTony Torralba

Introduced: 13 Jul 2023

CVE-2023-37960  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

There is no fixed version for io.jenkins.plugins:mathworks-polyspace.

Overview

Affected versions of this package are vulnerable to Arbitrary File Read. MathWorks Polyspace Plugin 1.0.5 and earlier does not restrict the path of the attached files in Polyspace Notification post-build step. This allows attackers with Item/Configure permission to send emails with arbitrary files from the Jenkins controller file system.

CVSS Base Scores

version 3.1