Path Traversal Vulnerability in Jenkins Continuous Integration with Toad Edge Plugin
CVE-2022-28148

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
29 March 2022

Summary

The file browser component in Jenkins Continuous Integration, specifically in the Toad Edge Plugin version 2.3 and earlier, contains a vulnerability that allows for path traversal on Windows systems. This occurs when the file browser misinterprets certain file paths as absolute, enabling attackers with Item/Read permissions to access and extract content from files across the Windows controller environment. This flaw underscores the necessity for diligent management of plugin vulnerabilities to safeguard sensitive data.

Affected Version(s)

Jenkins Continuous Integration with Toad Edge Plugin <= 2.3

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.