-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | < 2.121.2 | 2.121.2 |
| org.jenkins-ci.main:jenkins-core | maven | >= 2.122, < 2.132 | 2.132 |
The vulnerability stems from missing path validation in the doDynamic method that serves plugin resources. The commit diff shows a security check was added to explicitly block '/.TIMESTAMP2' paths, and the test case confirms this file was previously accessible. The method's responsibility for handling dynamic plugin resource requests makes it the direct entry point for this information exposure.
A Semantic Attack on Google Gemini - Read the Latest Research