Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0753 Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.
Github GHSA Github GHSA GHSA-23h5-8ph6-7rfc Path traversal vulnerability in Jenkins Fortify Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T04:36:05.956Z

Reserved: 2022-02-15T00:00:00

Link: CVE-2022-25188

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-15T17:15:09.547

Modified: 2024-11-21T06:51:46.637

Link: CVE-2022-25188

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses