CVE-2022-34179
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Jenkins Embeddable Build Status Plugin versiones 2.0.3 y anteriores, permite especificar un parámetro de consulta "style" que es usada para elegir un estilo de imagen SVG diferente sin restringir los valores posibles, resultando en una vulnerabilidad de salto de ruta relativa que permite a atacantes sin permiso Overall/Read especificar rutas a otras imágenes SVG en el sistema de archivos del controlador de Jenkins
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-21 CVE Reserved
- 2022-06-22 CVE Published
- 2024-01-13 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2792 | 2023-11-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jenkins Search vendor "Jenkins" | Embeddable Build Status Search vendor "Jenkins" for product "Embeddable Build Status" | <= 2.0.3 Search vendor "Jenkins" for product "Embeddable Build Status" and version " <= 2.0.3" | jenkins |
Affected
|