-
CVSS Score
-The vulnerability stems from improper path sanitization when handling user-controlled filenames from coverage reports. The pre-patch code in SourceCodePainter.java's invoke() method used raw 'entry.getKey()' to create destination paths (via 'destination.child(entry.getKey())'), while CoverageResult.java's getSourceFile() method concatenated 'relativeSourcePath' without validation. The commit introduced a 'sanitizeFilename' function and applied it to these inputs, confirming these were the vulnerable points. The functions directly processed attacker-controlled paths without sanitization, enabling arbitrary file writes via '../' sequences.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:cobertura | maven | <= 1.15 | 1.16 |
A Semantic Attack on Google Gemini - Read the Latest Research