GHSA-8864-pwhg-3mp2

Suggest an improvement
Source
https://github.com/advisories/GHSA-8864-pwhg-3mp2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8864-pwhg-3mp2/GHSA-8864-pwhg-3mp2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8864-pwhg-3mp2
Aliases
Published
2022-05-14T03:05:26Z
Modified
2024-02-16T08:16:34.056896Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Arbitrary file write vulnerability in Jenkins Fortify CloudScan Plugin
Details

A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.

Database specific
{
    "nvd_published_at": "2018-06-26T17:29:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-30T22:10:25Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin

Package

Name
org.jenkins-ci.plugins:fortify-cloudscan-jenkins-plugin
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/fortify-cloudscan-jenkins-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.2

Affected versions

1.*

1.0.0
1.1.0
1.1.1
1.2.0
1.3.0
1.3.1
1.4.0
1.4.1
1.5.0
1.5.1

Database specific

{
    "last_known_affected_version_range": "<= 1.5.1"
}