Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-6356
HistoryFeb 20, 2018 - 12:00 a.m.

CVE-2018-6356

2018-02-2000:00:00
ubuntu.com
ubuntu.com
6

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.288 Low

EPSS

Percentile

96.8%

Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent
specifying relative paths that escape a base directory for URLs accessing
plugin resource files. This allowed users with Overall/Read permission to
download files from the Jenkins master they should not have access to. On
Windows, any file accessible to the Jenkins master process could be
downloaded. On other operating systems, any file within the Jenkins home
directory accessible to the Jenkins master process could be downloaded.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.288 Low

EPSS

Percentile

96.8%