Vulnerability Description
Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Publish Over Ssh | <= 1.22 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/01/12/6Mailing ListThird Party Advisory
- https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2307Vendor Advisory
- http://www.openwall.com/lists/oss-security/2022/01/12/6Mailing ListThird Party Advisory
- https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2307Vendor Advisory
FAQ
What is CVE-2022-23113?
CVE-2022-23113 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Ite...
How severe is CVE-2022-23113?
CVE-2022-23113 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23113?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Publish Over Ssh.