Vulnerability Description
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Jenkins | <= 2.138.1 |
Related Weaknesses (CWE)
References
- https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867Vendor Advisory
- https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867Vendor Advisory
FAQ
What is CVE-2018-1000997?
CVE-2018-1000997 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java...
How severe is CVE-2018-1000997?
CVE-2018-1000997 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000997?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Jenkins.