Jenkins Matrix Project Plugin directory traversal | CVE-2024-23900

NAME
__________
Jenkins Matrix Project Plugin directory traversal

Platforms Affected:
Jenkins Matrix Project Plugin 822.v01b_8c85d16d2

Risk Level:
4.6

Exploitability:
Unproven

Consequences:
Gain Access

DESCRIPTION
__________

Jenkins Matrix Project Plugin could allow a remote authenticated attacker to traverse directories on the system, caused by not sanitize user-defined axis names of multi-configuration projects. An attacker could send a specially crafted URL request containing “dot dot” sequences (/../) to replace arbitrary config.xml files on the Jenkins controller file system.

CVSS 3.0 Information
__________

Privileges Required:
Low

User Interaction:
Required

Scope:
Unchanged

Access Vector:
Network


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.