Path Traversal Vulnerability in Jenkins Continuous Integration with Toad Edge Plugin
CVE-2022-28148

6.5MEDIUM

What is CVE-2022-28148?

The file browser component in Jenkins Continuous Integration, specifically in the Toad Edge Plugin version 2.3 and earlier, contains a vulnerability that allows for path traversal on Windows systems. This occurs when the file browser misinterprets certain file paths as absolute, enabling attackers with Item/Read permissions to access and extract content from files across the Windows controller environment. This flaw underscores the necessity for diligent management of plugin vulnerabilities to safeguard sensitive data.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Continuous Integration with Toad Edge Plugin <= 2.3

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.