Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 6, 2023
Package
Affected versions
<= 2.138.3
>= 2.140, <= 2.153
Patched versions
2.138.4
2.154
Description
Published by the National Vulnerability Database
Dec 10, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jun 30, 2022
Last updated
Dec 6, 2023
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
References