Bug: Path Traversal
Description of the product:
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.
The vulnerability allows a remote attacker to perform directory traversal attacks. Also The vulnerability exists due to input validation error when processing directory traversal sequences on Windows.
Upgrade to version org.jenkins-ci.main:jenkins-core:2.315,2.303.2 Learn More