CVE-2022-34179
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins Embeddable Build Status Plugin from Jenkins Project contain the following vulnerability:
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
- CVE-2022-34179 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins Embeddable Build Status Plugin version <= 2.0.3
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_Embeddable_Build_Status_Plugin | <= 2.0.3 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34179 : Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query paramet… twitter.com/i/web/status/1… | 2022-06-22 14:48:20 |
![]() |
Jenkins - CVE-2022-34179: jenkins.io/security/advis… | 2022-06-23 19:00:12 |