Path traversal vulnerability in Jenkins Fortify Plugin
Moderate severity
GitHub Reviewed
Published
Feb 16, 2022
to the GitHub Advisory Database
•
Updated Oct 27, 2023
Description
Published by the National Vulnerability Database
Feb 15, 2022
Published to the GitHub Advisory Database
Feb 16, 2022
Reviewed
Dec 1, 2022
Last updated
Oct 27, 2023
Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the
appName
andappVersion
parameters of its Pipeline steps, which are used to write to files inside build directories.This allows attackers with Item/Configure permission to write or overwrite
.xml
files on the Jenkins controller file system with content not controllable by the attacker.Jenkins Fortify Plugin 20.2.35 sanitizes the
appName
andappVersion
parameters of its Pipeline steps when determining the resulting filename.References