CVE-2016-4987:
Jenkins Image Gallery Plugin allows Path Traversal
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61466%
CWE
Published
5/13/2022
Updated
3/13/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.tupilabs.image_gallery:image-gallery | maven | < 1.4 | 1.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues:
- The original getRelativeFrom method manually traversed parent directories without using secure path resolution, making it susceptible to path traversal.
- createImageGallery accepted user-controlled 'baseRootFolder' input without verifying it was contained within the artifacts directory. The patch added Path normalization and the isChild() check to address these issues, confirming these functions were the attack vectors.