A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-1072 | vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0024 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/106176 | vdb entry third party advisory |
https://www.tenable.com/security/research/tra-2018-43 | third party advisory exploit |