Arbitrary File Read Affecting org.jenkins-ci.main:jenkins-core package, versions [,2.121.2) [2.130, 2.133)
Threat Intelligence
Exploit Maturity
Mature
EPSS
6.25% (94th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGJENKINSCIMAIN-32434
- published 26 Jul 2018
- disclosed 23 Jul 2018
- credit Orange Tsai
Introduced: 23 Jul 2018
CVE-2018-1999002 Open this link in a new tabHow to fix?
Upgrade org.jenkins-ci.main:jenkins-core
to version 2.121.2, 2.133 or higher.
Overview
org.jenkins-ci.main:jenkins-core is an open source automation server.
Affected versions of this package are vulnerable to Arbitrary File Read via the org/kohsuke/stapler/Stapler.java
class. An attacker could send a malicious HTTP
requests which return the contents of any file on the Jenkins master file system.
References
CVSS Scores
version 3.1