Path traversal vulnerability in Jenkins agent names
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 22, 2023
Package
Affected versions
< 2.263.2
>= 2.264, < 2.275
Patched versions
2.263.2
2.275
Description
Published by the National Vulnerability Database
Jan 13, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jun 23, 2022
Last updated
Dec 22, 2023
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override unrelated
config.xml
files. If the globalconfig.xml
file is replaced, Jenkins will start up with unsafe legacy defaults after a restart.Jenkins 2.275, LTS 2.263.2 ensures that agent names are considered valid names for items to prevent this problem.
In case of problems, this change can be reverted by setting the Java system property
jenkins.model.Nodes.enforceNameRestrictions
tofalse
.References