An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-904 | vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0024 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/106176 | third party advisory vdb entry |