Arbitrary File Write Affecting org.jenkins-ci.main:jenkins-core package, versions [,2.138.2)[2.140, 2.146)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Write vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGJENKINSCIMAIN-73610
  • published9 Jan 2019
  • disclosed9 Jan 2019
  • creditOleg Nenashev

Introduced: 9 Jan 2019

CVE-2018-1000406  (opens in a new tab)
CWE-434  (opens in a new tab)

How to fix?

Upgrade org.jenkins-ci.main:jenkins-core to version 2.138.2, 2.146 or higher.

Overview

org.jenkins-ci.main:jenkins-core is an open source automation server.

Affected versions of this package are vulnerable to Arbitrary File Write. An attacker with Job/Configure permission could define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.

CVSS Scores

version 3.1